Back to Developers
Mohamed Abushadi

Mohamed Abushadi

SOC Analyst Trainee

Cairo, Egypt 0+ yrs exp 71 · Very Good

About

Cybersecurity enthusiast focused on Blue Team operations, Security Operations Center (SOC) analysis, threat detection, and incident response. Hands-on experience in security monitoring, log analysis, phishing analysis, PCAP review, and incident investigation through practical labs and SOC simulation environments. Brings 9 years of operational experience in cryptocurrency infrastructure operations, remote troubleshooting, telemetry monitoring, and automation for distributed systems. Skilled in analyzing Windows telemetry, identifying suspicious behavior, and mapping adversary techniques to the MITRE ATT&CK framework. Experienced with Wireshark, Splunk, Nmap, Metasploit, Nessus, and Python-based automation. Currently preparing for CompTIA Security+ and advancing toward CySA+, with strong interest in SOC operations, detection engineering, and security automation.

Skills & Expertise (45)

SOC Operations Advanced
8.6/10
9
Years Exp
Threat Detection Advanced
8.3/10
9
Years Exp
Incident Response Advanced
8.2/10
9
Years Exp
Splunk Advanced
7.8/10
3
Years Exp
WIRESHARK Advanced
7.5/10
5
Years Exp
IDS NAT IPS PCAP Analysis Phishing triage IOC extraction Python Basics Conditions Loops Functions File Handling Error Handling Linux basics Analytical Thinking Attention to Detail Problem Solving Communication Teamwork Documentation Continuous Learning Nmap Alert Triage IOC Analysis Case Documentation MITRE ATT&CK Mapping Windows Event Logs Sysmon Event Viewer Log Parsing Suspicious activity detection Proxy Burp Suite Metasploit Nessus TCP IP DNS DHCP Routing and Switching VPN

Work Experience

SOC Analyst Trainee

Archon Security

Jan 2026 - Present

Performed security event monitoring and alert triage in structured SOC simulation environments. Investigated Windows telemetry, including Sysmon and Event Viewer logs, to identify persistence indicators, privilege misuse, and anomalous authentication behavior. Analyzed phishing emails, extracted indicators of compromise (IOCs), and mapped observed techniques to the MITRE ATT&CK framework. Conducted PCAP traffic analysis using Wireshark to detect common network threats, suspicious connections, and anomalous traffic behavior. Applied the six-step Incident Response methodology to document findings, containment actions, and remediation recommendations in case-based scenarios. Developed foundational SIEM investigation skills using Splunk, including searching, filtering, pivoting, and basic correlation. Practiced malware triage using static and dynamic analysis basics and performed vulnerability assessment activities using Nessus.

Operator

Cryptocurrency Infrastructure Operations and Remote Automation

Present - Present

Operated and monitored 24/7 distributed infrastructure with focus on stability, resilience, and rapid troubleshooting. Implemented secure remote operations practices, including controlled access and remote management hygiene, for geographically distributed nodes. Monitored performance telemetry and system logs to proactively identify failures and network bottlenecks and executed corrective actions. Built IoT-based automation using Sonoff to remotely control power and cooling systems, supporting faster recovery and safer operations. Diagnosed network and connectivity issues impacting distributed systems performance and restored service continuity.

Education

No education history added yet

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 0/10
⏱️ Experience 6/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 71/100

Profile Overview

Member sinceMay 2026

Availability Details

Visa Status

Green Card

Relocation

Open to Relocation