CybersecurityPenetration TestingSecurity Data Analysis

Hello, I'm
Jibin George.

Currently working as a Security Analyst at Prevalent AI. In my role, I develop advanced security use cases, optimize incident response, and help improve security posture for Fortune 500 companies.

Scroll to discover

I'm a Cybersecurity Analyst specializing in Vulnerability Assessment and Penetration Testing (VAPT). With over two years of experience working with Fortune 500 companies, I've developed security use cases and streamlined incident response using tools like Splunk, SQL, and Tableau. I'm also ranked as an 'Elite Hacker' on HackTheBox and hold certifications like CompTIA Security+ and CEH. Passionate about solving complex security challenges, I enjoy sharing my insights on cybersecurity through my blog.

2+Years of experience
1M+Endpoints Secured
40+Machines Pwned
✨ Achievements

Achievements.

My Achievements:

HTB Rank

Elite Hacker Rank, Hack The Box

KaPAI

KaPAI Awards, Prevalent AI

0 / 0 Achievements
✨ Cybersecurity Tools and Solutions

Cybsecurity Tools and Solutions.

Cybersecurity Tools and Solutions I Have Utilized:

Crowdstrike

Crowdstrike

Wiz

Wiz

Tanium

Tanium

Tenable

Tenable

Splunk

Splunk

Elastic Search

Elastic Search

0 / 0 tools
✨ Certifications

Cybsecurity Certifications.

Here are the cybersecurity certifications I have completed:

EC Council, CEH

EC Council, CEH

CompTIA Security+

CompTIA Security+

✨ Projects

Cybersecurity Projects.

Here are the personal cybersecurity projects I have completed so far:

Cybersecurity Research Lab

Building a Cybersecurity Research Lab

Malware Analysis using CNN and OSINT

Malware Analysis using Convolutional Neural Networks and OSINT

Threat Hunting

Threat Hunting using Machine Learning Algorithms and OSINT

0 / 0 projects

Need more info?
I got you.

Here are some areas I've contributed to. If you have any questions, please feel free to reach out!

Penetration TestingConducted extensive penetration tests by identifying vulnerabilities, and achieved elite hacker rank in HackTheBox.
Vulnerability ManagementLed vulnerability management efforts at a Fortune 500 company, pinpointing critical weaknesses and developing effective remediation strategies.
Continuous Control and MonitoringImplemented continuous control measures and monitoring for enterprise systems, ensuring real-time detection and response to threats.
Security Use Case DevelopmentDeveloped customized security use cases for a Fortune 500 client, enhancing incident response and proactive defense capabilities.
Security Data AnalysisExecuted security data analysis with tools like Wiz, Tanium, Tenable, Nessus, Azure AD, and Lansweeper to drive security improvements.

Let's work together.

Let's discuss how I can contribute to your success. I look forward to hearing from you!