Hey there! I am Shino Shamit a Cybersec Grad, who likes to break things, ethically ;) and then write the report that explains exactly what happened.
How I think and what I focus on
My focus is on practical cybersecurity work: triage, investigation, threat hunting, and improving detections. I like working with frameworks such as MITRE ATT&CK and OWASP to structure thinking, map behaviors to techniques, and document clear actions for containment and remediation.
I value clean, audit-ready documentation: what happened, how we know, impact, and what we changed to prevent a repeat.
Open to SOC / Junior Analyst / Detection / Threat Hunting roles
Strengths Investigation thinking, rule tuning, clear reporting
Interests SIEM detections, IR playbooks, threat intel, automation
Tools and areas I work with
Built a real-world styled cybersecurity home lab using Microsoft Azure and Microsoft Sentinel to simulate a small Security Operations Centre (SOC) environment. The goal of this project was to gain hands-on experience with log ingestion, threat detection, incident analysis, and security visualisation using cloud-native tools.
Drafted detections mapped to ATT&CK, created investigation checklists, and tuned rule logic to reduce false positives.
Practiced SQLi, XSS, and access-control issues. Documented findings in a clear, report-like format with mitigations.
Analyzed packet captures, identified suspicious traffic patterns, and wrote concise summaries of what happened and why.
What I’ve done
Email: shinoshamitau@outlook.com
LinkedIn: linkedin.com/in/shino-shamit
GitHub: https://github.com/shinoshamit25-afk