Shaik Hazaruddin
Software Engineer and Photographer in kurnool
Hard-core cybersecurity professional with 4+ years of hands-on experience across SOC operations, threat detection, incident response, and deep malware & Android malware analysis. Strong background in reverse engineering, static and dynamic analysis, and behavior-based detection of real-world threats. Actively drives security investigations using Splunk, Azure Data Explorer (KQL), and Microsoft Defender, bridging malware research with SOC operations to deliver high-confidence detections and actionable threat intelligence.
🔍 Expertise:
SOC Operations & Threat Detection: Threat Hunting, Incident Response, Phishing & Insider Threat Investigations, Alert Tuning, Log Monitoring, and Dashboard Creation
Android Malware Analysis: APK Reverse Engineering, Dynamic & Static Analysis, Obfuscation Techniques, DEX File Analysis, Frida, Xposed, Dalvik/ART, Mobile Forensics
Malware & DFIR: Malware Analysis, Reverse Engineering (Ghidra, IDA Pro, CyberChef), IOC Extraction, Signature Creation, Behavioral Analysis, Digital Forensics
SIEM & Cloud Security: Splunk (SPL), Azure Data Explorer (KQL), Microsoft Security Tools (Defender for Endpoint, MTP, MDO, MDI, MCAS, Purview DLP)
Programming & Automation: KQL, PowerShell, Python, Power Automate
Tools & Platforms: VirusTotal, CyberChef, Intezer, Wireshark, KEStudio, Researcher Studio, URLVoid, Windows Sandbox
🛠 Frameworks & Methodologies: MITRE ATT&CK, Cyber Kill Chain, CIA Triad, OSI Model, AutoGen
I thrive in high-pressure environments, working to turn complex alerts into actionable insights while continuously improving SOC processes. I am passionate about staying ahead of evolving cyber threats by consistently exploring new techniques and tools to strengthen security operations.