Hey there! I am Shino Shamit a Cybersec Grad, who likes to break things, ethically ;) and then write the report that explains exactly what happened.
How I think and what I focus on
My focus is on practical cybersecurity work: triage, investigation, threat hunting, and improving detections. I like working with frameworks such as MITRE ATT&CK and OWASP to structure thinking, map behaviors to techniques, and document clear actions for containment and remediation.
I value clean, audit-ready documentation: what happened, how we know, impact, and what we changed to prevent a repeat.
Open to SOC / Junior Analyst / Detection / Threat Hunting roles
Strengths Investigation thinking, rule tuning, clear reporting
Interests SIEM detections, IR playbooks, threat intel, automation
Tools and areas I work with
Built a real-world styled cybersecurity home lab using Microsoft Azure and Microsoft Sentinel to simulate a small Security Operations Centre (SOC) environment. The goal of this project was to gain hands-on experience with log ingestion, threat detection, incident analysis, and security visualisation using cloud-native tools.
Developed an automated job intelligence system using n8n workflow automation to continuously discover and analyse entry-level cybersecurity roles across Australia. The system integrates Google APIs and SerpAPI to collect job listings, applies rule-based filtering to remove roles requiring citizenship or security clearance, and ranks opportunities based on relevance. Results are automatically structured and stored in dashboards for efficient tracking and analysis.
Practiced SQLi, XSS, and access-control issues. Documented findings in a clear, report-like format with mitigations.
Analyzed packet captures, identified suspicious traffic patterns, and wrote concise summaries of what happened and why.
What I’ve done
Email: shinoshamitau@outlook.com
LinkedIn: linkedin.com/in/shino-shamit
GitHub: https://github.com/shinoshamit25-afk