Threat Detection & Monitoring
Engineering SIEM pipelines, log analysis workflows, and continuous network monitoring to identify anomalies across systems.
Cyber Security Analyst
Cyber Security Analyst | SOC Analyst | Certified CSA
Certified SOC Analyst (CSA) with a strong foundation in threat detection, incident response, and system hardening. Highly proficient in Linux administration and experienced in engineering complex virtual network environments for security testing.
I care about practical security work: useful monitoring, hardened Linux systems, clean incident response habits, and small tools that make investigation faster.
Based in Kerala, India. You can reach me at favassalam88@gmail.com or see my code on GitHub.
Employs a proactive, defense-first mindset to analyze network traffic, monitor logs, and rapidly mitigate vulnerabilities across systems.
Engineering SIEM pipelines, log analysis workflows, and continuous network monitoring to identify anomalies across systems.
Implementing system hardening, configuring secure virtual environments, and mitigating active vulnerabilities with a defense-first mindset.
Developing lightweight security tooling and automating defensive workflows for faster triage, investigation, and response.
Architected a Defense-in-Depth posture by remediating 100+ misconfigurations to meet CIS Benchmarks. Successfully elevated the host's compliance score from 26% to 83% by implementing kernel module blacklisting, filesystem restrictions, and a high-fidelity auditd telemetry engine integrated with a Dockerized Wazuh stack.
View projectBuilt a lightweight JavaScript scanner in Go to accelerate local recon and triage. It identifies hardcoded secrets, risky client-side sinks, prototype pollution patterns, and GraphQL clues through a CLI and local web UI using only the standard library.
Open repositoryConfigured hidden entry points, system misconfigurations, and cryptographic challenges to practice reconnaissance, request manipulation, traffic interception, and vertical privilege escalation while studying both offensive paths and defensive detection.
EC-Council
ISC2
TryHackMe
RedTeam Hacker Academy
Vidya Academy of Science & Technology Technical Campus
Managed the end-to-end development of multiple applications, integrating security-first practices into the development lifecycle. Oversaw project workflows and delivered responsive support to ensure secure, stable product delivery.
Technical walkthrough covering the remediation of 100+ misconfigurations on a minimalist Arch Linux endpoint to achieve an 83% CIS Benchmark score. Demonstrates a defense-in-depth methodology, shifting from a vulnerable baseline to a production-hardened posture via layered kernel, filesystem, and identity-level controls.
Open writeupPeelr is a fast JavaScript security scanner for bug bounty hunters and security researchers. Point it at a .js file and it highlights the lines worth opening first: exposed secrets, dangerous sinks, prototype pollution gadgets, GraphQL clues, and source-to-sink taint flows.