Cyber Security Analyst

MOHAMMAD FAVAS S

Cyber Security Analyst | SOC Analyst | Certified CSA

Certified SOC Analyst (CSA) with a strong foundation in threat detection, incident response, and system hardening. Highly proficient in Linux administration and experienced in engineering complex virtual network environments for security testing.

I care about practical security work: useful monitoring, hardened Linux systems, clean incident response habits, and small tools that make investigation faster.

Based in Kerala, India. You can reach me at favassalam88@gmail.com or see my code on GitHub.

Location Kerala, India
Writeups 2 published

Defense-first monitoring, hardened infrastructure, and practical security engineering.

Employs a proactive, defense-first mindset to analyze network traffic, monitor logs, and rapidly mitigate vulnerabilities across systems.

Primary areas of work.

Threat Detection & Monitoring

Engineering SIEM pipelines, log analysis workflows, and continuous network monitoring to identify anomalies across systems.

Incident Response & Hardening

Implementing system hardening, configuring secure virtual environments, and mitigating active vulnerabilities with a defense-first mindset.

Security Automation

Developing lightweight security tooling and automating defensive workflows for faster triage, investigation, and response.

Tools and platforms.

SIEM & Threat Monitoring

Network & Traffic Analysis

Security Assessment & VAPT

Systems & Infrastructure

Scripting & Automation

Selected work.

Hardened Sensor & Compliance Baseline

Linux Hardening & SIEM Orchestration

Architected a Defense-in-Depth posture by remediating 100+ misconfigurations to meet CIS Benchmarks. Successfully elevated the host's compliance score from 26% to 83% by implementing kernel module blacklisting, filesystem restrictions, and a high-fidelity auditd telemetry engine integrated with a Dockerized Wazuh stack.

View project
Lightweight JavaScript scanner

Peelr

Built a lightweight JavaScript scanner in Go to accelerate local recon and triage. It identifies hardcoded secrets, risky client-side sinks, prototype pollution patterns, and GraphQL clues through a CLI and local web UI using only the standard library.

Open repository
Intentionally vulnerable machine

Infinity Castle

Configured hidden entry points, system misconfigurations, and cryptographic challenges to practice reconnaissance, request manipulation, traffic interception, and vertical privilege escalation while studying both offensive paths and defensive detection.

Academic and professional credentials.

Apr 2026

Certified SOC Analyst (CSA)

EC-Council

Feb 2026

Certified in Cybersecurity (CC)

ISC2

Feb 2026

Jr Penetration Tester Learning Path

TryHackMe

2025 - 2026

Certified IT Infrastructure and Cyber SOC Analyst

RedTeam Hacker Academy

2021 - 2025

B.Tech, Computer Science & Engineering

Vidya Academy of Science & Technology Technical Campus

Professional experience.

Apr 2024 - Sep 2025

Freelance Software Developer

Managed the end-to-end development of multiple applications, integrating security-first practices into the development lifecycle. Oversaw project workflows and delivered responsive support to ensure secure, stable product delivery.

  • Threat detection engineering
  • Incident response readiness
  • Linux system hardening
  • Virtual lab security testing
  • Defense-first analysis of logs, endpoints, and network traffic
  • Hands-on experience building isolated virtual lab environments
  • Strong Linux administration and hardening foundation
  • Practical automation for faster triage and investigation