OBAID

ULLAH

I’m a cybersecurity professional skilled in penetration testing, SOC analysis, SIEM monitoring, and incident response. I use tools like Splunk, Nessus, Metasploit, OWASP ZAP, and Kali Linux for vulnerability checks and threat detection. My web development background helps me suggest clear, practical security fixes.

OBAID

ULLAH

Web Application

Testing

+

Cyber Security

+

SIEM
Monitoring

+

Incident
Response

I'm Obaid Ullah

I’m a cybersecurity professional skilled in penetration testing, SOC analysis, SIEM monitoring, and incident response. I use tools like Splunk, Nessus, Metasploit, OWASP ZAP, and Kali Linux for vulnerability checks and threat detection. My web development background helps me suggest clear, practical security fixes.

Credly Badges

Skills Wallet

Cybersecurity Skills Portfolio
Cybersecurity
1 source of skill evidence
IN DEMAND FUTURE PROOF TRENDING
Computer security, cybersecurity, or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. Learn more
Credly Badges
Cisco Badge
Introduction to Cybersecurity, Cisco
(Issued Aug 10, 2025)
Information Privacy
1 source of skill evidence
Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Learn more
Credly Badges
Cisco Badge
Introduction to Cybersecurity, Cisco
(Issued Aug 10, 2025)
Network Security
1 source of skill evidence
TRENDING
Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Learn more
Credly Badges
Cisco Badge
Introduction to Cybersecurity, Cisco
(Issued Aug 10, 2025)
Threat Detection
1 source of skill evidence
IN DEMAND
Threat detection is the process of identifying, quantifying, and prioritizing (or ranking) the threats to a system. Learn more
Credly Badges
Cisco Badge
Introduction to Cybersecurity, Cisco
(Issued Aug 10, 2025)

TryHackMe

Badges

I actively use TryHackMe as a hands-on cybersecurity learning platform to strengthen my practical skills alongside my academic studies and certifications. I regularly complete guided learning paths, rooms, and Capture The Flag (CTF) challenges covering areas such as network security, Linux fundamentals, web application security, cryptography, privilege escalation, and incident response. Through TryHackMe, I regularly engage with structured learning paths, individual rooms, and Capture The Flag (CTF) challenges that cover a wide range of cybersecurity domains, including network security, Linux fundamentals, web application security, cryptography, privilege escalation, and incident response. This consistent practice has helped me build a strong technical foundation and improve my ability to analyze systems from both offensive and defensive security perspectives.

Reviews

Let's work together on someting great

Contact Info

How can I contribute?

I can contribute to your projects by applying my technical skills in cybersecurity, vulnerability assessment, and compliance to strengthen security measures and ensure regulatory alignment. With hands-on experience using tools like Nessus, Metasploit, OWASP ZAP, and Splunk, I can support threat detection, risk analysis, and secure system implementation. My background in web development and GDPR compliance also allows me to add value in areas where security and functionality intersect, helping your team deliver secure and reliable solutions.