Skip to content
View ShyamSrivastav's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report ShyamSrivastav

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ShyamSrivastav/README.md

👋 Hi, I'm Shyam | Cybersecurity Analyst (Open To WORK)

I’m an aspiring cybersecurity analyst with a strong foundation in threat detection, network security, and hands-on troubleshooting. I’ve built my skills through industry-recognized certifications and practical labs, and I’m actively seeking remote or hybrid entry-level roles where I can contribute to a security-focused team.

tryhackme stats

📌 Summary

  • Certified CompTIA Security+ (SY0-701) ce and [PCEP-30-02] PCEP™ – Certified Entry-Level Python Programmer
  • Completed Google Cybersecurity Certificate (V2)
  • Experienced in SIEM deployment (Wazuh), VPN setup, and network diagnostics
  • Proficient with tools like Wireshark, Burp Suite, Nmap, and Windows Defender

🛠️ Skills

  • Security Operations: SIEM (Wazuh), Microsoft Defender, IDS/IPS monitoring, Incident Response, Threat Hunting, Log Analysis
  • Networking: TCP/IP, VPN, Packet Capture & Analysis, Firewall Rules, Router/Switch Configuration
  • Security Tools: Wireshark, Burp Suite, Nmap, Cisco Packet Tracer, tcpdump
  • Operating Systems: Windows 10/11, Kali/Parrot Linux, TrueNAS Core
  • Scripting: Python (PCEP), Basic SQL
  • Soft Skills: Analytical thinking, troubleshooting, adaptability, communication

📫 Connect with me!


Popular repositories Loading

  1. ShyamSrivastav ShyamSrivastav Public

    1

  2. vpn-remote-access-tally vpn-remote-access-tally Public

    Secure remote access infrastructure using OpenVPN, SMB, and Tally Prime

  3. snort-live-attacks-soc1-tryhackme snort-live-attacks-soc1-tryhackme Public

    Snort SOC L1 hands‑on lab: investigate live and captured traffic from the "Snort Challenge — Live Attacks" room; document detections, rules, and mitigations.