Cybersecurity Portfolio

Abazar Adam

Cybersecurity Engineer & Security Analyst

Specializing in offensive security, vulnerability assessment, and building resilient defense systems. Bridging the gap between attacking assumptions and securing critical infrastructure.

Analyzing threats. Fortifying networks. Securing the future.
abazeradamwork@gmail.com+60 11-2888 5466

Profile Snapshot

Aspiring Cybersecurity Engineer and SOC Analyst with hands-on experience in penetration testing, vulnerability assessment, and security operations.

Founder of EvoTech, leading client security initiatives and mitigating real-world phishing threats.

Actively pursuing CompTIA Security+ (SY0-701) and ISC2 certifications to validate advanced security expertise.

Red TeamSOC AnalystVulnerability AssessmentCloud Security

About Me

I am a Cybersecurity Engineering student and security practitioner passionate about offensive security and defensive architecture. My journey involves rigorous lab simulations in Kali Linux, practical web vulnerability analysis, and delivering security-first IT solutions through EvoTech. I aim to leverage my technical foundation in network security, OSINT, and automation to protect organizational assets as a Cybersecurity Engineer or SOC Analyst.

Core Competencies

Network SecurityThreat AnalysisSecurity AuditingIncident Response

Badges & Achievements

Digital badges earned through rigorous assessments and practical exams.

Associate Cybersecurity

Associate Cybersecurity

Ethical Hacker

Ethical Hacker

FortiGate Operator

FortiGate Operator

ISC2 Candidate

ISC2 Candidate

Cyber Threat Management

Cyber Threat Management

Network Defense

Network Defense

Education

Bachelor of Computer Science (Hons.) – Cybersecurity

Multimedia University (MMU), Malaysia | 2023 – Present

Dean's List Award – 2025

Academic Focus

Network SecurityThreat AnalysisSecurity AuditingIncident Response

Certifications

Verified credentials demonstrating technical proficiency in cybersecurity and network defense.

Fortinet Certified Associate in Cybersecurity

Fortinet

View Certificate

Cisco Networking Academy – Ethical Hacker

Cisco Networking Academy

View Certificate

Fortinet Certified Fundamentals – Cybersecurity

Fortinet NSE Fundamentals Track

View Certificate

Getting Started in Cybersecurity 3.0

Fortinet Training

View Certificate

Technical Introduction to Cybersecurity 3.0

Fortinet Training

View Certificate

FortiGate 7.6 Operator Certification

Fortinet

View Certificate

Fortinet Certified Associate in Cybersecurity

Fortinet

View Certificate

Cisco Networking Academy – Ethical Hacker

Cisco Networking Academy

View Certificate

Fortinet Certified Fundamentals – Cybersecurity

Fortinet NSE Fundamentals Track

View Certificate

Getting Started in Cybersecurity 3.0

Fortinet Training

View Certificate

Technical Introduction to Cybersecurity 3.0

Fortinet Training

View Certificate

FortiGate 7.6 Operator Certification

Fortinet

View Certificate

Website Development from 5G Technology

5G Technology

View Certificate

HP LIFE – Marketing Benefits vs. Product Features

HP LIFE

View Certificate

HP LIFE – Data Presentation

HP LIFE

View Certificate

HP LIFE – Effective Website Design

HP LIFE

View Certificate

Cisco – Cyber Threat Management

Cisco Networking Academy

View Certificate

Cisco – Network Defense

Cisco Networking Academy

View Certificate

Website Development from 5G Technology

5G Technology

View Certificate

HP LIFE – Marketing Benefits vs. Product Features

HP LIFE

View Certificate

HP LIFE – Data Presentation

HP LIFE

View Certificate

HP LIFE – Effective Website Design

HP LIFE

View Certificate

Cisco – Cyber Threat Management

Cisco Networking Academy

View Certificate

Cisco – Network Defense

Cisco Networking Academy

View Certificate

Currently pursuing: CompTIA Security+ (SY0-701) & ISC2 Certified in Cybersecurity (CC).

Technical Arsenal

Offensive Security

Penetration TestingRed Team OperationsVulnerability AssessmentPrivilege EscalationSocial EngineeringCredential Harvesting

Defensive Security

SOC MonitoringSIEM AnalysisEndpoint HardeningThreat IntelligenceAccess Control Policies

Security Tools

Kali Linux SuiteBurp Suite / OWASP ZAPNmapWiresharkMetasploitSplunkQRadar

Programming & Automation

Python (Security Automation)Bash ScriptingC / C++SQL / NoSQLAssembly (Basic)

Cloud & DevOps

AWS FundamentalsDocker ContainersGit Version ControlCI/CD Concepts

Operating Systems

Linux (Debian/RedHat)Windows ServerActive Directory

Experience & Projects

CyberGuardX — Project Lead & Developer (2026)

Developed web-based security assessment platform simulating real-world penetration testing workflows.

Built Email Breach Detection module cross-referencing compromised credential datasets.Implemented Machine Learning-based Phishing URL Detection system.Designed Password Strength Analyzer using entropy-based risk scoring.Created automated OWASP Top 10 vulnerability scanner with risk prioritization and remediation guidance.Generated structured security reports aligned with industry best practices.

EvoTech — Founder & Technical Lead (2024)

Delivered secure web applications and IT infrastructure to 50+ clients.

Reduced vulnerability exposure through secure SDLC and security hardening practices.Detected and mitigated phishing campaigns and social engineering threats.Managed remote cross-functional technical teams and project deployments.

Fawrico Platform — Cybersecurity Consultant & QA (2026)

Cybersecurity Consultant & Quality Assurance — Conducted security assessments and QA on platform features.

Conducted security assessments and vulnerability analysis on platform features.Identified and reported security flaws and misconfigurations.Collaborated with developers to improve secure coding practices.Performed QA testing to ensure platform stability, functionality, and security compliance.Contributed to improving overall system reliability and user data protection.

Security Research & Lab Simulation (2025 – Present)

Conducted simulated penetration testing in controlled lab environments.

Performed network traffic analysis and anomaly detection using Wireshark.Executed vulnerability scanning and exploitation using Metasploit framework.Practiced OSINT investigations and attack surface mapping techniques.

CyberThreatX (v1.0) — SOC-in-a-Box Platform (2026)

Engineered lightweight SOC platform with real-time log ingestion, Sigma-based detection, and ML anomaly scoring.

Built Flask dashboard with alert triage, RBAC, correlation engine, and threat intelligence enrichment.Implemented Sigma-based detection pipeline with real-time log analysis and ML-driven anomaly scoring.Containerized the platform using Docker for scalable and production-ready deployment.

ReconMaster — Advanced Reconnaissance Framework (2026)

Developed modular automated reconnaissance framework with parallel subdomain enumeration and service discovery.

Integrated Nmap scanning, HTTP service detection, and cloud bucket enumeration with structured reporting.Designed scalable async architecture using FastAPI, Asyncio, and Playwright with stealth controls.Implemented proxy rotation, rate limiting, and evasion techniques for reliable large-scale reconnaissance.

Languages & Soft Skills

Languages

ArabicNative
EnglishFluent (Professional)
SpanishBeginner

Professional Competencies

Analytical Problem SolvingStrategic Risk AssessmentTechnical DocumentationTeam LeadershipEffective Communication

Career Objective

Bringing hands-on lab experience and practical security engineering skills to strengthen organizational defense.

Contact

Open to opportunities in Cybersecurity Engineering, SOC Analysis, and Security Research. Let's secure the future together.

Current Focus

Actively engineering CyberGuard's advanced threat heuristics, scaling CyberThreatX into a production-grade SOC platform with real-time detection, and expanding ReconMaster's offensive reconnaissance capabilities — while pursuing CompTIA Security+ certification to validate industry-standard expertise.