Curiosity • Clarity • Control

Hey there! I am Shino Shamit a Cybersec Grad, who likes to break things, ethically ;) and then write the report that explains exactly what happened.

  • Turn messy alerts and weird traffic into clear, evidence-based timelines
  • Build detections, tune signal quality, and map behavior to MITRE ATT&CK
  • Document findings so incidents lead to stronger defenses — not repeat incidents
Melbourne, AU Cyber Security Grad (RMIT) Threat Hunting Detection-as-Code
Photo of Shino Shamit

What I have done and like doing

A hands-on security lab using Microsoft Azure, and a portfolio of detections + incident investigations with clear write-ups and outcomes.

Links

LinkedIn · GitHub · Email

About

How I think and what I focus on

My focus is on practical cybersecurity work: triage, investigation, threat hunting, and improving detections. I like working with frameworks such as MITRE ATT&CK and OWASP to structure thinking, map behaviors to techniques, and document clear actions for containment and remediation.

I value clean, audit-ready documentation: what happened, how we know, impact, and what we changed to prevent a repeat.

Quick facts

Open to SOC / Junior Analyst / Detection / Threat Hunting roles

Strengths Investigation thinking, rule tuning, clear reporting

Interests SIEM detections, IR playbooks, threat intel, automation

Skills

Tools and areas I work with

Security Operations

  • Alert triage & escalation
  • Incident response basics
  • Threat hunting workflows
  • MITRE ATT&CK mapping
  • Detection rule tuning
  • Runbooks & playbooks
  • Log analysis
  • Evidence & timelines

Tools & Technical

  • Wireshark
  • Nmap
  • Burp Suite
  • SQLmap
  • Metasploit / Armitage
  • SIEM using Mircrosoft Sentinel
  • PowerShell & scripting
  • Linux fundamentals
  • OWASP Top 10

Projects

Home SOC Lab

Built a real-world styled cybersecurity home lab using Microsoft Azure and Microsoft Sentinel to simulate a small Security Operations Centre (SOC) environment. The goal of this project was to gain hands-on experience with log ingestion, threat detection, incident analysis, and security visualisation using cloud-native tools.

VirtualizationAzureMircrosoft Snetinel

Cybersecurity Job Intelligence Automation System

Developed an automated job intelligence system using n8n workflow automation to continuously discover and analyse entry-level cybersecurity roles across Australia. The system integrates Google APIs and SerpAPI to collect job listings, applies rule-based filtering to remove roles requiring citizenship or security clearance, and ranks opportunities based on relevance. Results are automatically structured and stored in dashboards for efficient tracking and analysis.

ATT&CKRule tuningPlaybooks

Web Security Labs

Practiced SQLi, XSS, and access-control issues. Documented findings in a clear, report-like format with mitigations.

BurpSQLiXSS

Network Analysis Drills

Analyzed packet captures, identified suspicious traffic patterns, and wrote concise summaries of what happened and why.

WiresharkPCAPIOCs

Experience

What I’ve done

Tecknova IT Solutions
July • 2025 — November • 2025
  • Hands-on practice across web security, network analysis, and defensive workflows using real security tools.
  • Produced structured documentation: findings, impact, recommended mitigations, and verification steps.
  • Developed practical understanding of triage, investigation steps, and mapping behavior to ATT&CK techniques.
Mercy Place Wyndhamf
July • 2024 — July • 2025
  • Worked within a highly regulated healthcare environment requiring strict adherence to operational procedures, safety standards, and confidentiality requirements.
  • Maintained high levels of attention to detail while following documented protocols and compliance guidelines.
  • Demonstrated reliability and accountability while working independently during shift-based operations.
  • Collaborated with multidisciplinary teams to support secure and efficient daily facility operations.
  • Collaborated cross-functionally with service teams to translate client requirements into technical data solutions, improving delivery speed, quality, and accuracy.
  • Maintained awareness of privacy and confidentiality requirements when handling sensitive environments and information..

Contact