Skip to content
View ozzysahin's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report ozzysahin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ozzysahin/README.md

Hello, I'm Ozgur Sahin πŸ‘‹

Cybersecurity Professional

I'm a seasoned cybersecurity professional with expertise in SIEM management, endpoint security, and threat detection. I specialize in vulnerability management, malware analysis, and leveraging threat intelligence for proactive risk mitigation. Currently focusing on expanding my Ethical Hacking skills to complement my defensive security background.

πŸ”’ Core Expertise

  • SIEM Implementation & Management: Splunk Enterprise Security, IBM QRadar, ELK Stack
  • Endpoint Security: CrowdStrike Falcon, SentinelOne
  • Threat Intelligence & Analysis: OpenCTI, MITRE ATT&CK Framework, OSINT
  • Vulnerability Management: Tenable, Armis, Acunetix
  • Ethical Hacking: Penetration testing methodologies, Metasploit framework

πŸ›‘οΈ Security Frameworks

  • MITRE ATT&CK
  • CIS Controls
  • NIST-800
  • ISO 27001
  • OWASP

πŸ† Certifications

  • CompTIA CSAP
  • CompTIA CySA+
  • CompTIA Security+
  • Splunk Core Certified Power User
  • Fortinet Certified Associate Cybersecurity
  • Google IT Support
  • In Progress: AWS Cloud Practitioner, Splunk Enterprise Certified Administrator

View my complete certification profile: Credly Profile

πŸ“š Repository Guide

My repositories contain practical implementation notes, configurations and tutorials on:

  • Linux Administration: Installation guides, time settings, essential commands, disk management, networking fundamentals
  • NGINX Configuration: Implementation as a reverse proxy, security hardening, performance optimization
  • Homelab Setup: Architecture, component selection, network design, management tips
  • Proxmox VE: Installation procedures, VM management, backups, maintenance best practices
  • Splunk Enterprise: Deployment architecture, configuration, indexer clustering, deployment server setup
  • Threat Intelligence: OpenCTI implementation, threat feeds integration, STIX/TAXII utilization
  • Penetration Testing: Metasploit framework usage, ethical hacking methodologies, tool walkthroughs
  • Security Tools: In-depth guides on popular cybersecurity and ethical hacking tools

More repositories on additional cybersecurity topics will be added regularly.

πŸ”— Connect With Me

"The only truly secure system is one that is powered off..." β€” GS

Popular repositories Loading

  1. ozzysahin ozzysahin Public

  2. archer-t2u-plus-linux archer-t2u-plus-linux Public

    Forked from Krishak15/archer-t2u-plus-linux

    TP-Link Archer T2U Plus / AC600 High Gain USB Wifi Adapter Review & Driver installation Guide for various platforms.

    Shell