Nijat Mammadov.
I am a
Security Engineer specializing in both offensive and defensive security to proactively minimize operational risk and impact.
Interactive Terminal
Establish secure connection... Done.
Type 'help' to see available commands.
Work Experience
Information Security Engineer
EarthLink LLC | Atlanta, USA
- Investigated and contained advanced security incidents, including zero-day exploits, APTs, large-scale DDoS, and data exfiltration, minimizing operational impact.
- Conducted threat research and profiling using VirusTotal, ThreatFox, Shodan, and AbuseIPDB to identify emerging risks.
- Deployed and monitored SentinelOne EDR, analyzing endpoint logs and telemetry for proactive monitoring and early threat detection.
- Enhanced email security via Hornetsecurity, performing phishing detection, message tracing, and compliance checks.
- Ran Nessus vulnerability scans and collaborated with IT teams to validate remediation and reduce risk.
- Audited Azure identities and permissions to detect anomalies and enforce least-privilege access controls.
- Monitored security alerts and dark/deep web sources for leaked credentials and potential threats.
Data Leaks and Security Analyst
Inforotor | Prague, Czech Republic
- Researched data leaks and analyzed compromised account databases (private TG channels and similar).
- Monitored open/closed sources, including TOR, for breach intelligence.
- Supported password manager security and credential protection tasks.
- Collaborated with an international cybersecurity team.
Cybersecurity Analyst
CERT.AZ | Baku, Azerbaijan
- Supported DFIR investigations: evidence collection, log analysis, root cause ID.
- Reviewed Checkmarx results to advise development teams on secure coding.
- Responded to phishing, malware, DDoS, and ransomware incidents.
- Conducted threat analysis using open-source tools and Splunk log analysis.
Cybersecurity Analyst
Aztelekom LLC | Baku, Azerbaijan
- Performed web and network penetration testing across company environments.
- Developed Python scripts to automate log analysis (web servers, firewalls).
- Identified and reported security vulnerabilities in subnetworks.
Technical Arsenal
Blue Team
Red Team
Code & Tools
Education
PhD in Cybersecurity
IEU Malta
Current
Master's in Computer Science
Eötvös Loránd University
GPA: 4/5
Bachelor of IT
Baku Engineering University
GPA: 88/100
Certifications
Certified AppSec Practitioner
ID: 8192272
SOC Analyst
LetsDefend.io
IBM Cybersecurity Analyst
IBM Coursera
Languages
Hall of Fame
Recognized by industry leaders for security contributions and responsible vulnerability disclosures.
NASA
Vulnerability Disclosure
Mercedes-Benz
Security Acknowledgement
Others
Contributor Recognition
Projects & Research
Current Focus: AI in Security
Actively researching the intersection of LLMs and Cybersecurity. Leveraging AI for automated threat hunting and log anomaly detection while studying Adversarial ML attacks.
4tail
A simple but real-based modified tool designed for bug bounty hunters to streamline workflow through efficient log trailing and filtering.
Dencer
Secure Python tool for file encryption and decryption utilizing AES-GCM standards ensuring strict confidentiality.
Mugetsu
Automated threat analysis tool integrated with VirusTotal to detect malicious activity with detailed, color-coded CLI output.
Project [REDACTED]
A powerful, private offensive security toolset developed for specialized operations. Operational details remain strictly classified.
How Hackers Hide Their Traces
Deep dive into operational security (OpSec) techniques used by fraudsters in the wild.
Boost Subdomain Enumeration
Advanced reconnaissance techniques to exponentially expand attack surface discovery.
Get In Touch
Currently based in Budapest, Hungary. I am always open to discussing new opportunities, exploring security research, or just saying hello. Let's connect.