./Cyberseef
System.Status: Online

> initialize_userMalik Touseef Husnain

Cybersecurity Professional | Threat Hunter | DFIR Specialist

root@cyberseef:~
root@cyberseef:~$ ./init_portfolio.sh
> Loading modules...
[+] Cybersecurity Framework .......... OK
[+] Threat Intelligence ............ OK
[+] Penetration Testing ............ OK
[+] Digital Forensics .............. OK

root@cyberseef:~$ whoami
"A proactive Security Researcher specializing in protecting digital infrastructures through offensive and defensive strategies."
root@cyberseef:~$ _
>

whoami

user_profile.txt

> Hello, World. I am Malik Touseef Husnain.

A dedicated Cybersecurity Specialist with over 2 years of operational experience in threat hunting, VAPT (Vulnerability Assessment & Penetration Testing), and Digital Forensics.

I architect secure infrastructures and dismantle vulnerabilities before they can be exploited. My expertise spans tailored security solutions, from deploying Snort-based IDS to conducting advanced malware analysis in isolated sandboxes.

[*] Current Status: Open to Opportunities (Blue/Red Team, SOC)
[*] Location: Remote / Hybrid
[*] Education: BS Cybersecurity (FAST-NUCES)
TryHackMe_Stats
[View_Profile]
Rank: Checking...Rooms Completed: ...

> System_Attributes

Network Security92%
Penetration Testing88%
Digital Forensics85%
Cloud Security (AWS)80%
Blue_Team_Ops
Red_Team_Ops

./skills_&_certs

> Assessing technical capabilities...
> Verified certifications loaded.

[!] RED_TEAM_OPS

Ethical Hacking
72%

Identifying security vulnerabilities through controlled testing. Proficient in frameworks like OWASP Top 10 and MITRE ATT&CK for comprehensive security assessments.

Penetration Testing
70%

Experienced in systematic testing of systems and applications using industry-standard tools like Metasploit, Burp Suite, and Nmap to identify and exploit vulnerabilities.

[#] BLUE_TEAM_OPS

Network Security
75%

Advanced understanding of network security architectures. Proficiency with Wireshark, Snort, and Zeek for traffic analysis and intrusion detection.

Threat Hunting
65%

Proactively identifying and analyzing potential security threats using advanced security tools like Splunk, ELK Stack, YARA, and Sigma.

[*] CLOUD_INFRA

Cloud Security
68%

Implementing security controls in cloud environments, with specialized knowledge in AWS (IAM, CloudTrail, EC2) and compliance frameworks.

Secure Coding
60%

Applying secure programming practices (Python, Bash), identifying common vulnerabilities, and implementing secure development lifecycle principles.

Verified_Certifications // Authority: Global

[CCPP]Jan 2026
Certified C++ Practitioner
Red Team Leaders
[CTIGA]Jan 2026
Certified Threat Intel Analyst
Red Team Leaders
[CRTOM]Dec 2025
Cert. Red Team Ops Mgmt
Red Team Leaders
[CCEP]Dec 2025
Cert. Cybersecurity Educator
Red Team Leaders
[Forensics]Mar 2025
Windows Forensics
Belkasoft
[BTJA]Nov 2024
Blue Team Junior Analyst
Security Blue Team
[PMAT]Aug 2024
Practical Malware Analysis
TCM Security
[CNSP]Dec 2023
Cert. Network Security Practitioner
The SecOps Group
[CCSP-AWS]Aug 2023
Cloud Security (AWS)
The SecOps Group
[DFIR]Jul 2023
YARA, Sigma & Belkasoft X
Belkasoft
[CAP]Apr 2023
Cert. AppSec Practitioner
The SecOps Group
[FLTA]Mar 2023
Foundation Threat Intel Analyst
arcX

vi /var/log/history

> Reading career timeline...
> 2 files found: education.log, work.log

[]

./education.log

> National University of Computer and Emerging Sciences

System.Origin: FAST-NUCES
[2019-2025]

Degree: Bachelor of Science (Cybersecurity)

Comprehensive curriculum focused on offensive/defensive security domains, digital forensics, and network architecture. Integrated computer science fundamentals to master low-level system understanding.

// Extracurriculars_

NU Computing Society, FAST Community Service, Cyber Space Legion (CSL)

> Cadet College Hasanabdal

System.Origin: CCH
[2014-2019]

Track 01: Pre-Engineering [Grade A]

Period: 2018 - 2019
Focused on Mathematics & Physics foundations.

Track 02: Matriculation [Grade A+]

Period: 2014 - 2017
General Science distinction.

// Leadership_&_Societies_

Aeromodelling Club, Geomodelling Club, Community Service Society, Red Crescent Society.

[]

./achievements.log

> The Bronze Standard

[Dec 2018]

Award: Duke of Edinburgh's International

Global recognition for exceptional commitment to personal development, community service, and leadership resilience.

[]

./volunteering.log

> Google Maps Guide

[Since Oct 2018]

Enhancing global mapping ecosystem accuracy through local intelligence contributions.

> Pakistan Red Crescent

[2017 - 2019]

Deployed for humanitarian initiatives and community crisis support vectors.

> WWF - Pakistan

[2017 - 2018]

Operated within environmental conservation units and eco-internship protocols.

> Akhuwat Institute

[2016 - 2018]

Engaged in social welfare algorithms and leadership development subroutines.

[]

./work.log

> Business Development Officer

Org: Air Academic
Nov 2021 – Present

// Role: Hybrid / Strategic_Planning

Executing strategic business development protocols and managing high-value B2B client relationships. Optimizing acquisition vectors for sustained growth.

> GRC & Penetration Testing Intern

Org: National CERT
Jul 2025 – Aug 2025

// Domain: Governance_&_Red_Teaming

Advanced training in GRC standards (ISO 27001). Executed hands-on policy review and vulnerability assessment simulations in a controlled national-level environment.

> Security Consultant / Freelancer

Platform: Fiverr
Nov 2021 – Nov 2023

// Ops: DFIR / Malware_Analysis

  • - Delivered 30+ projects focused on digital forensics and malware triage.
  • - Engineered a Smart Home Honeypot using Snort IDS and ML-based anomaly detection.
  • - Developed virtualized lab environments for secure testing.

> Academic Mentor

Org: STEM Wizards Academia
Dec 2022 – Apr 2023
// Program: Girls_Technovation

Mentored participants in secure development lifecycles. Guided the architecture of an AI-powered secure messaging application with integrated malicious link detection.

> Cyber Threat Hunter

Org: ThincsCorp
Jul 2022 – Oct 2022

// Ops: Threat_Intel / IR

Conducted proactive threat hunting operations using IOCs/TTPs aligned with MITRE ATT&CK. Enriched threat intelligence datasets and executed log correlation strategies.

./projects

> Listing repositories...
> Found 7 public modules_

./root/capstone_project

Critical_Asset

EagleAI – AI-Based Network IDPS

System.Description: Developed a DDoS detection system using supervised ML models on CIC DDoS 2019 dataset. Created pipeline for traffic collection, preprocessing, and anomaly scoring.

PythonAutoMLTensorFlowInfluxDBFlaskWireshark
output.logbash
$ python3 eagle_ai.py --monitor
[INFO] Initializing Traffic Analyzer...
[INFO] Loading Pre-trained Models... DONE
Monitoring network interface [eth0]
----------------------------------------
[SAFE] Packet ID: #4492 | Source: 192.168.1.45
[SAFE] Packet ID: #4493 | Source: 10.0.0.12
[ALERT] DDoS Pattern Detected! | Source: 45.2.1.99 | Confidence: 99.8%
[ACTION] Blocking IP 45.2.1.99... SUCCESS

> Standard_Modules

Smart Home Honeypot IDS

Created an ML-based intrusion detection honeypot for IoT/Smart Home environment. Used Snort and custom Python scripts to emulate intrusion events. Delivered full project with documentation and alert dashboards for monitoring potential threats.

#Snort#Python#Machine Learning#IoT Security#IDS

Cuckoo Sandbox Installation Guide

Comprehensive guide for setting up Cuckoo Sandbox 2, including host and guest machine configuration for malware analysis. Optimized the installation process to reduce setup time by 30% and troubleshooted common configuration issues. Over 50 GitHub stars from security professionals.

#Malware Analysis#Sandbox#Security Tool

Ny-Scan

Host and Port Discovery Scanner based on Nmap, created in Python. Features customizable scan profiles and automated reporting. Successfully identified 15% more open services compared to basic scanning techniques in testing environments.

#Python#Network Security#Penetration Testing

DVWA Installation Guide

Comprehensive guide for setting up and configuring Damn Vulnerable Web Application (DVWA) for penetration testing practice. Includes containerized deployment options and security configurations. Used by over 200 cybersecurity students and professionals.

#Web Security#Penetration Testing#Documentation

SEED Labs Projects

Collection of completed SEED Labs exercises focusing on various cybersecurity attack and defense techniques. Implemented 12+ attack simulations and defense mechanisms, creating educational resources for practical security learning.

#Security#Hands-on Labs#C

Zeek Installation Guide

Updated installation guide for Zeek Network Security Monitor on Ubuntu 22.04 LTS with configuration instructions. Includes performance optimization tips for high-traffic network environments and integration with SIEM solutions.

#Network Security#Monitoring#Shell

Get In Touch

Have a security question or interested in working together? Send me a message!

> ESTABLISH_SECURE_CONNECTION

[Protocol_Status]

Encrypted (TLS 1.3)

[Transmission_Line]

[Digital_Mailbox]

[Social_Uplinks]

PGP_Public_Key.asc
FP: F27F 9C17 955F 8E86 0015...