About
Cybersecurity professional with experience across Security Operations (SOC) and Digital Forensics. Experienced in log monitoring, alert triage, SIEM use case validation, and incident response while ensuring SLA-driven incident closure. Skilled in validating log source onboarding, reducing false positives through rule tuning, and supporting high-severity security incidents. Possess hands-on expertise in forensic imaging, hash verification (MD5/SHA1/SHA256), Windows artifact analysis, mobile logical extraction, and evidence preservation with proper chain of custody. Strong understanding of threat detection, log correlation, TCP/IP protocols, and investigative reporting.
Skills & Expertise (24)
Work Experience
Computer Forensics Analyst
Kelenix Technologies LLP
Jan 2025 - Jan 2026
Computer Forensics Analyst with hands-on experience supporting regulatory search and seizure operations in coordination with the Income Tax Department. Experienced in forensic acquisition, disk imaging, mobile extraction, artifact analysis, and defensible reporting. Proficient in FTK, FTK Imager, Cellebrite UFED, Oxygen Forensics, Magnet AXIOM (including AXIOM Agent), and RAKSHAK. Strong understanding of evidence preservation, hash verification (MD5/SHA1/SHA256), and chain of custody. Supported digital evidence handling during regulatory search & seizure (raid) operations with the Income Tax Department. Performed forensic imaging of desktops, laptops, and external storage devices using write blockers and validated integrity through hash verification. Conducted logical, file system, and physical extractions of mobile devices using Cellebrite UFED, Oxygen Forensics, and Magnet AXIOM. Analyzed Windows forensic artifacts including Registry hives, Event Logs, browser history, USB artifacts, email data, and deleted files. Generated forensic backups and ensured strict chain of custody documentation for evidentiary admissibility. Utilized FTK and Magnet AXIOM for timeline analysis, keyword searches, and artifact correlation. Assisted in preparing structured forensic analysis reports for investigative and legal use.
Security Operations Center (SOC) Analyst Cyber Crime Investigator
Maharashtra State Cyber
Jan 2024 - Jan 2025
Responsible for continuous security monitoring and first-level incident response in a SOC environment. Experienced in real-time log monitoring, alert triage, and severity classification (Low/Medium/High/Critical) based on predefined playbooks and escalation procedures. Skilled in validating log source onboarding to ensure required logs are properly ingested, parsed, and visible within the SIEM platform. Capable of identifying suspicious activities and Indicators of Compromise (IOCs) through log analysis, pattern observation, and basic event correlation. Done initial investigation of security alerts to determine legitimacy, documented findings clearly, and escalated validated incidents to higher-level teams when required. Ensured incidents were tracked and updated within ticketing systems while maintaining SLA compliance. Assisted in reducing false positives by verifying alert triggers before escalation and following standard operating procedures. Contributed to preparation of daily, weekly, and monthly monitoring reports and supported communication during high-severity incidents.
Education
Master's in Computer Science - Kirti M. Doongursee College
2023 - 2025 · Afghanistan
Bachelors in Computer Science - Kirti M. Doongursee College
2020 - 2023 · Afghanistan
Certifications
Computer Hacking Forensic Investigator CHFI
EC COUNCIL · 2025
Digital Forensics & Mobile Forensics
EC COUNCIL · 2025
CERTIFIED ETHICAL HACKER V12
EC COUNCIL · 2025
Cyber Forensics Security Measures SQL Injections Attacks
EC COUNCIL · 2025
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation