Sk Jahir Abbas

DevOps Manager

Bengaluru, Karnataka, India1 yr 11 mos experience
AI EnabledAI ML Practitioner

Key Highlights

  • Expert in threat intelligence and malware analysis.
  • Proficient in developing detection rules and incident response.
  • Strong background in dark web research and proactive defense.
Stackforce AI infers this person is a Cybersecurity professional specializing in threat intelligence and incident response.

Contact

Skills

Core Skills

Incident ResponseCyber Threat IntelligenceThreat IntelligenceMalware AnalysisVulnerability ManagementPenetration Testing

Other Skills

Artificial Intelligence (AI)Azure SentinelBasics of assembly LanguageBurp SuiteCommunicationComputer Hardware TroubleshootingComputer NetworkingCroudstrikeCryptographyCyber Kill Chain FrameworkCyber Threat Hunting (CTH)CybersecurityDarkwebDetection Signature WritingEDR

About

Passionate cybersecurity professional with expertise in threat intelligence, malware analysis, threat hunting and incident response. Currently a Threat Analyst at Sophos, I specialize in developing detection rules, conducting dark web research, and delivering actionable insights to combat emerging threats. Proficient in tools like IDA Pro, Wireshark, Suricata and Snort, with certifications in Ethical Hacking and Cyber Threat Intelligence. Committed to safeguarding organizations through proactive defense and innovative solutions. Let’s connect to drive cybersecurity excellence!

Experience

1 yr 11 mos
Total Experience
11 mos
Average Tenure
1 yr
Current Experience

Sophos

MDR - Threat Analyst

Apr 2025Present · 1 yr · Bengaluru, Karnataka, India · Remote

  • Investigate and respond to real-time alerts using SIEM and Sophos EDR/XDR platforms.
  • Perform advanced threat hunting leveraging endpoint, network, and telemetry data to detect stealthy threats.
  • Conduct post-incident analysis including root cause, kill chain mapping, and mitigation strategies.
  • Analyze Windows event logs and TCP/IP traffic for forensic investigation.
  • Automate tasks using Python, PowerShell, and SQL to enhance operational efficiency.
  • Perform threat intelligence analysis, correlating IoCs and TTPs using MITRE ATT&CK framework.
  • Collaborate closely with Incident Response and Threat Intel teams to contain and neutralize threats.
  • Exposure to cloud security monitoring (AWS, Azure) and hybrid infrastructure defense.
SIEMSophos EDR/XDRthreat huntingPythonPowerShellSQL+3

Subex

2 roles

Threat Intelligence Researcher

May 2024Apr 2025 · 11 mos · Bengaluru, Karnataka, India

  • Developed and deployed 300+ custom Snort and YARA rules, enhancing malware and network trojan detection accuracy and threat classification.
  • Conducted in-depth analysis using tools like Wireshark, IDA Pro, and Ghidra to reverse engineer files and network packets, identifying emerging threats and attack methodologies.
  • Monitored the dark web and performed data breach research using tools like Tor Browser, VirusTotal, Shodan, and Maltego to proactively identify compromised data, adversary tactics, and emerging threat vectors.
  • Collaborated closely with the product team to build datasets for machine learning models and advanced threat research.
  • Designed and executed proof-of-concept (POC) attack simulations and test cases for IT, OT, and IoT environments to assess vulnerabilities and enhance detection capabilities.
  • Deployed decoy systems, including honeypots and honey tokens, to detect and analyse emerging threats and adversary tactics.
  • Performed offensive security research on honeypot devices, uncovering new vulnerabilities and providing insights to improve security posture.
  • Delivered comprehensive network forensics reports for ICS/SCADA environments, uncovering vulnerabilities in OT infrastructure and supporting mitigation strategies.
  • Created detailed intelligence reports to address the latest threats targeting operational technology (OT) infrastructure, supporting proactive threat mitigation efforts.
SnortYARAWiresharkIDA ProGhidraTor Browser+5

Security Researcher

Oct 2023Apr 2024 · 6 mos · Bengaluru, Karnataka, India

  • Reverse Engineer File and network packets to identify threats.
  • Write Signatures on both network packets and files to classify threats.
  • Perform Dark web monitoring and Data Breach research to collect compromised data, find new threat
  • actors, and threat vectors.
  • Collaborate with existing product team and support them in collecting/building data required for product, machine learning and threat research.
  • Keep track of latest threats on the OT infrastructure and build intelligence data and reports.
  • Perform offensive security research on the honeypot devices to identify new vulnerabilities and threat
  • vectors.
reverse engineeringdark web monitoringoffensive security researchThreat IntelligenceMalware Analysis

Infovirtech pvt. ltd.

Cyber Security Intern

Mar 2022Apr 2022 · 1 mo · India

  • Intern in Cybersecurity, working with the Vulnerability Assessment and Penetration Testing (VAPT) team.
  • Identified and resolved vulnerabilities in machines through penetration testing.
  • Developed skills in vulnerability assessment, penetration testing, and report writing.
  • Created detailed reports documenting findings and recommendations.
Vulnerability AssessmentPenetration Testingreport writingVulnerability Management

Education

University Of North Bengal

Master of Computer Applications - MCA — Computer Application and Cybersecurity

Sep 2021Sep 2023

MSME TOOL ROOM KOLKATA

CHNM — Computer Hardware and Network Maintenance

Nov 2021Dec 2021

The University of Burdwan

Bachelor's degree — Mathematics

Jan 2018Jan 2021

BHATAR M P HIGH SCHOOL

12th — Science

Mar 2016Mar 2018

Aruar B M D P Institution

10th — Education

Stackforce found 100+ more professionals with Incident Response & Cyber Threat Intelligence

Explore similar profiles based on matching skills and experience