Default Avatar
Candidate Name
Cyber Security Engineer
Poland
Summary

Cybersecurity Engineer | Ethical Hacker | SOC Specialist

Cyber threats are evolvingβ€”so should cybersecurity. As a Cybersecurity Engineer, SOC Specialist, and Ethical Hacker, I specialize in offensive and defensive security, ensuring organizations stay ahead of attackers.

With expertise in penetration testing, threat hunting, SOC operations, and incident response, I help businesses identify vulnerabilities, mitigate risks, and build resilient cybersecurity frameworks.

πŸ›‘ Security Operations & Incident Response
I thrive in high-pressure Security Operations Centers (SOCs), handling:

πŸ”Ή Incident Response (IR): Containing & eradicating threats before escalation.
πŸ”Ή SIEM & Threat Monitoring: Expertise in Splunk, ELK, Wazuh,, Sentinel.
πŸ”Ή Digital Forensics: Log analysis, malware analysis, forensic investigations.
πŸ”Ή SOAR & Security Automation: Automating response workflows using Cortex XSOAR, TheHive.
πŸ”Ή Threat Intelligence & Hunting: Detecting APTs, phishing, and malware campaigns.

πŸš€ Offensive Security & Research
Security isn’t just about defenseβ€”I simulate real-world attacks to strengthen systems. Some of my key projects:

βœ… SOC Lab – Real-world attack simulation & IR training platform.
βœ… Advanced Keylogger Research – Identifying keylogging techniques & countermeasures.
βœ… Android RAT – Developed remote access trojan for Android using Java.
βœ… DLP Insider Threat Detection – AI-powered Data Loss Prevention (DLP) tool.
βœ… ThreatScout Domains – Spoofed domain detection to prevent phishing scams.
βœ… WebSphereAlert – Automated website uptime & anomaly detection.

πŸ”§ Tool Arsenal
My expertise extends across various offensive, defensive, and forensic tools, including:

πŸ”Ή Red Teaming & Pentesting: Kali Linux, Metasploit, Burp Suite, Nmap, Zmap, Nessus, BloodHound.
πŸ”Ή SOC & SIEM Tools: Splunk, ELK, Sentinel, Wazuh, TheHive, MISP, Google Chronicle.
πŸ”Ή Forensics & Threat Hunting: Autopsy, Wireshark, Suricata, Ghidra.
πŸ”Ή Security Automation: Python, Sigma Rules, SOAR.

πŸ’‘ Why Connect with Me?
πŸ”Ή Incident Response & Digital Forensics Expert – Rapidly mitigating security breaches.
πŸ”Ή Red Team & Penetration Testing Specialist – Simulating attacks to enhance defenses.
πŸ”Ή SOC & Threat Intelligence Innovator – Strengthening SIEM/SOAR capabilities.
πŸ”Ή Security Automation & AI Integration – Developing custom cybersecurity tools.

πŸ’‘ Want to Know More?
Explore my portfolio & projects at: https://godsonchittilapilly.com

πŸš€ Let’s Secure the Future!

Experienced and dedicated Cyber Security Specialist with a diverse background in SOC operations, incident response, and software development. With a strong foundation in monitoring, detecting, and mitigating cyber threats, I excel at utilizing advanced security tools and technologies to safeguard organizational assets. My technical expertise spans Splunk, Elastic Stack, Wazuh, Microsoft Sentinel, and DevOps practices, complemented by a hands-on approach to troubleshooting and support. Proven experience in roles at Foundever, BNY Mellon, Brainotech IT Solutions, and Cybersoft Infosys has honed my skills in Unix/Linux systems, SQL, and web application management. Proficient in a wide range of programming languages and security practices, I am committed to continuous improvement and staying abreast of emerging cyber threats.

Work experience
01/03/2023
Cyber Security Engineer (SOC L2)
01/07/2022
01/12/2022
Cyber Security Specialist (TRM)
01/11/2021
01/07/2022
Senior Cyber Security Engineer
Education & certifications

Master's Degree
Business Management

Bachelor's Degree
Computer Science
Open to relocate
Skills
Cybersecurity Network Security Information Security Vulnerability Assessment Risk Management Incident Response Security Incident Management Security Incident Analysis Security Risk Assessment Penetration Testing Team Collaboration Problem Solving Security Awareness Training Security Training & Awareness Security Awareness Cloud Security Google Cloud Security Ethical Hacking Java React Native Python SIEM Tools (Splunk, QRadar, ELK) Wireshark Security Information and Event Management (SIEM) Digital Forensics Kali Linux Metasploit Nmap Nessus Burp Suite SOAR Automation Data Loss Prevention (DLP) CEH Red Team Exercises Cyber Threat Intelligence

You need to log in as an employer to view full candidate details.