LOADING...

Learning Timeline

Every step of a cybersecurity journey — from foundational study to specialized expertise.

Education
BSc in Computer Science & Engineering
University — Bangladesh
Studied core computer science fundamentals including networking protocols, operating systems, data structures, and algorithm design — establishing the academic foundation for a cybersecurity career.
NetworkingOS FundamentalsProgramming
2020
2021
Discovery
First Steps into Cybersecurity
Self-Study — Online Resources
Discovered the cybersecurity field through online communities, YouTube channels, and free courses. Learned about network security concepts, the CIA triad, common threats, and why defenders matter in the digital age.
CIA TriadNetwork BasicsThreat Landscape
Hands-On Training
Cybersecurity Deep Dive
TryHackMe · Hack The Box · Home Lab
Immersed in hands-on cybersecurity training, completing 100+ rooms on TryHackMe. Built a home lab with VirtualBox running multiple VMs — practicing Linux administration, network scanning, web exploitation, and defensive techniques.
TryHackMeLinuxNmapHome Lab
2022
2023
SOC Specialization
Blue Team Focus & SOC Analyst Path
LetsDefend · Blue Team Labs Online
Focused training on SOC operations — alert triage, SIEM platforms, log analysis, phishing investigation, and incident response workflows. Completed realistic SOC scenarios simulating real enterprise environments with Splunk and Microsoft Sentinel.
SplunkSIEMPhishing AnalysisAlert Triage
Certification & Projects
Microsoft SC-900 & Portfolio Building
Microsoft Learn · Self-Directed Projects
Pursuing the Microsoft SC-900 certification while actively building a portfolio of real-world cybersecurity projects — including a home SOC lab, threat intelligence automation scripts, malware analysis reports, and documented IR playbooks.
SC-900Python AutomationMalware AnalysisIR Playbooks
2024
2025 ←
Present · Target
Junior SOC Analyst Role
Target: Enterprise / MSSP / Cybersecurity Firm
Actively seeking a Junior SOC Analyst or Threat Analyst position where I can apply my hands-on lab experience, contribute meaningfully to a security team, and accelerate my professional development within a real-world security operations environment.
Open to WorkSOC AnalystThreat Hunter

What I've Learned

🧪
Labs Over Theory
Nothing replaces hands-on practice. Every PCAP I analyzed, every alert I triaged in a lab made concepts click in ways textbooks never could.
🗺️
Think Like an Attacker
The best defenders understand how attackers think. Studying offensive techniques and TTPs makes threat detection dramatically more effective.
📚
Never Stop Learning
The threat landscape evolves daily. Continuous learning — new CVEs, new TTPs, new tools — is not optional in cybersecurity; it's survival.