Zyad Elsheshtawy

Hello, I'm

Zyad Elsheshtawy

SOC Analyst | Incident Response Analyst

Your Security Is My Priority

Specializing in Security Operations and Incident Response, with hands-on experience in threat detection, log analysis, and network monitoring. Passionate about protecting digital environments and continuously developing practical cybersecurity skills through real-world labs and security platforms.

About Me

I am a Third-Year Cybersecurity Student at the Faculty of Artificial Intelligence, Menoufia University (Egypt), with a strong focus on Security Operations Centers (SOC) and Incident Response.

Through practical labs and cybersecurity platforms, I have developed hands-on experience in network monitoring, threat detection, log analysis, and security investigations. I regularly work with security tools such as Wireshark, Nmap, Burp Suite, Splunk, ELK Stack, and Wazuh to analyze network traffic, detect anomalies, and investigate potential security incidents.

My goal is to build strong expertise in cyber threat detection and incident response, helping organizations identify threats quickly and respond effectively to protect critical systems and data.

Egypt
+20 1010943355
zyadelking73@gmail.com
Availability: Hybrid

Career Objective

Motivated cybersecurity student seeking an opportunity as an Incident Response Analyst where I can apply my knowledge in network monitoring, log analysis, and threat detection to help organizations identify cyber threats and respond effectively to security incidents.

My long-term goal is to become a highly skilled Blue Team Security Specialist capable of defending modern infrastructures against evolving cyber threats.

Technical Skills

Security Operations

  • SOC Analysis
  • Incident Response
  • Threat Detection
  • Log Analysis
  • Network Traffic Analysis
  • PCAP Analysis

Security Tools

  • Wireshark
  • Nmap
  • Burp Suite
  • Splunk
  • ELK Stack
  • Wazuh

Networking Knowledge

  • TCP/IP
  • DNS
  • HTTP / HTTPS
  • Network Ports
  • OSI Model

Operating Systems

  • Linux
  • Kali Linux
  • Windows

Training Platforms

TryHackMe Hack The Box CyberDefenders LetsDefend

Portfolio Projects

SOC / Blue Team focused labs and implementations.

Network Traffic Analysis Lab

Analyzed captured PCAP files to identify suspicious network activity and potential indicators of compromise using Wireshark.

View Project

SOC Alert Investigation

Simulated SOC alert investigations by analyzing logs and identifying malicious activities through SIEM tools.

View Project

Web App Security Testing

Performed security testing on web applications using Burp Suite to identify vulnerabilities such as authentication issues and misconfigurations.

View Project

Threat Detection with SIEM

Implemented threat detection techniques using Splunk and ELK Stack to analyze security logs and detect abnormal activity patterns.

View Project

Experience & Labs

Cybersecurity Labs Practice

Self-Learning & Hands-on Labs
  • Performed network traffic analysis using Wireshark to inspect packet structures.
  • Investigated simulated security alerts and log events to trace threat origins.
  • Practiced real-world attack detection scenarios across varied environments.

TryHackMe Cybersecurity Labs

Continuous Learning Platform
  • Completed multiple rooms covering networking, security monitoring, and incident response.
  • Practiced real-world penetration testing and SOC investigation scenarios.

Blue Team Practice

Defensive Security
  • Log analysis and threat detection using diverse event sources.
  • Security event investigation and triaging false positives from true threats.
  • Network monitoring and foundational incident handling methodologies.

Services Offered

Security Monitoring

Monitoring security events and analyzing logs to detect suspicious activities and potential breaches.

Incident Response Support

Assisting organizations in detecting, analyzing, and responding to cybersecurity incidents efficiently.

Network Traffic Analysis

Inspecting local and external network traffic to identify anomalies and potential security threats.

Security Research & Threat Analysis

Researching cyber threats and analyzing attack techniques (TTPs) used by modern adversaries.

Contact Me

Let's connect and discuss cybersecurity opportunities.

Get In Touch

Whether you have a question or just want to say hi, I'll try my best to get back to you!