a
aailazahid

Aaila Zahid

@aailazahid

OSINT Analyst And Corporate Intelligence Researcher

Pakistan
Inglese, Urdu
Alcune informazioni sono riportate in lingua inglese.
Chi sono
Every organization leaks more than it realizes — through DNS records, certificate logs, cloud infrastructure, and email configs. I find it before someone else does. I'm an OSINT Analyst based in Lahore delivering passive external attack surface assessments, email security audits (SPF/DKIM/DMARC), subdomain reconnaissance, and professional intelligence reports, fully passive, fully ethical. EC-Council CHFI certified. Real investigations. Real reports.... Continua a leggere

Competenze

a
aailazahid
Aaila Zahid
offline • 
Tempo di risposta medio: 1 ora

Consulta i miei servizi

Indagini aziendali
I will investigate any company digital footprint and deliver a full repo
Indagini aziendali
I will research your competitor online infrastructure and digital presence

Portfolio

Esperienza lavorativa

SOC Analyst

CureMD • Part time

Jan 2026 - Apr 20263 mos

During my SOC Analyst internship, I gained hands-on experience in monitoring, analyzing, and responding to security events in a lab-based environment. I worked with tools like Wazuh and pfSense to detect suspicious activity, review alerts, investigate logs, and understand how security monitoring works in real-world networks. I practiced basic incident analysis, including identifying unusual login attempts, network traffic behavior, malware indicators, and system-level alerts. I also worked on malware analysis using both static and dynamic techniques to understand file behavior, suspicious processes, and possible attack patterns. My role also involved learning how to configure security rules, analyze firewall logs, and document findings in a clear and professional way. I explored automation using n8n with Wazuh to improve alert handling and reduce repetitive manual tasks. This internship helped me build a strong foundation in SOC operations, threat detection, log analysis, network security, and incident response. It also improved my ability to think like an attacker and defender, investigate issues carefully, and create structured reports for security findings.