INITIALIZING SECURE CONNECTION...
Hi, my name is

Nijat Mammadov.

I am a

Security Engineer specializing in both offensive and defensive security to proactively minimize operational risk and impact.

Resume
02.

Interactive Terminal

guest@nijat-portfolio:~
Welcome to Nijat's Portfolio CLI v2.0.0
Establish secure connection... Done.
Type 'help' to see available commands.
~
03.

Work Experience

Information Security Engineer

EarthLink LLC | Atlanta, USA

Oct 2024 - Apr 2026
  • Investigated and contained advanced security incidents, including zero-day exploits, APTs, large-scale DDoS, and data exfiltration, minimizing operational impact.
  • Conducted threat research and profiling using VirusTotal, ThreatFox, Shodan, and AbuseIPDB to identify emerging risks.
  • Deployed and monitored SentinelOne EDR, analyzing endpoint logs and telemetry for proactive monitoring and early threat detection.
  • Enhanced email security via Hornetsecurity, performing phishing detection, message tracing, and compliance checks.
  • Ran Nessus vulnerability scans and collaborated with IT teams to validate remediation and reduce risk.
  • Audited Azure identities and permissions to detect anomalies and enforce least-privilege access controls.
  • Monitored security alerts and dark/deep web sources for leaked credentials and potential threats.

Data Leaks and Security Analyst

Inforotor | Prague, Czech Republic

June 2025 - Mar 2026
  • Researched data leaks and analyzed compromised account databases (private TG channels and similar).
  • Monitored open/closed sources, including TOR, for breach intelligence.
  • Supported password manager security and credential protection tasks.
  • Collaborated with an international cybersecurity team.

Cybersecurity Analyst

CERT.AZ | Baku, Azerbaijan

Feb 2023 - June 2023
  • Supported DFIR investigations: evidence collection, log analysis, root cause ID.
  • Reviewed Checkmarx results to advise development teams on secure coding.
  • Responded to phishing, malware, DDoS, and ransomware incidents.
  • Conducted threat analysis using open-source tools and Splunk log analysis.

Cybersecurity Analyst

Aztelekom LLC | Baku, Azerbaijan

Nov 2022 - March 2023
  • Performed web and network penetration testing across company environments.
  • Developed Python scripts to automate log analysis (web servers, firewalls).
  • Identified and reported security vulnerabilities in subnetworks.
04.

Technical Arsenal

Blue Team

SOC Operations Incident Response Threat Intel Malware Analysis Splunk / ELK SentinelOne Azure Security WAF & Firewalls

Red Team

Penetration Testing Vuln Assessment Nessus Burp Suite Linux / Unix

Code & Tools

Python Bash PowerShell Jira Vibe Coding

Education

PhD in Cybersecurity

IEU Malta

Current

Master's in Computer Science

Eötvös Loránd University

GPA: 4/5

Bachelor of IT

Baku Engineering University

GPA: 88/100

Certifications

Certified AppSec Practitioner

ID: 8192272

SOC Analyst

LetsDefend.io

IBM Cybersecurity Analyst

IBM Coursera

Languages

English C1 (Advanced)
Azerbaijani C2 (Native)
Turkish C1 (Advanced)

Hall of Fame

Recognized by industry leaders for security contributions and responsible vulnerability disclosures.

NASA

Vulnerability Disclosure

Mercedes-Benz

Security Acknowledgement

Others

Contributor Recognition

05.

Projects & Research

Current Focus: AI in Security

Actively researching the intersection of LLMs and Cybersecurity. Leveraging AI for automated threat hunting and log anomaly detection while studying Adversarial ML attacks.

Prompt Injection Automated Triage Adversarial ML
Read Case Study

4tail

A simple but real-based modified tool designed for bug bounty hunters to streamline workflow through efficient log trailing and filtering.

Bash Recon
Read Case Study

Dencer

Secure Python tool for file encryption and decryption utilizing AES-GCM standards ensuring strict confidentiality.

Python Cryptography
Read Case Study

Mugetsu

Automated threat analysis tool integrated with VirusTotal to detect malicious activity with detailed, color-coded CLI output.

Python Threat Intel
Confidential

Project [REDACTED]

A powerful, private offensive security toolset developed for specialized operations. Operational details remain strictly classified.

??? Offensive

How Hackers Hide Their Traces

Deep dive into operational security (OpSec) techniques used by fraudsters in the wild.

Boost Subdomain Enumeration

Advanced reconnaissance techniques to exponentially expand attack surface discovery.

06. What's Next?

Get In Touch

Currently based in Budapest, Hungary. I am always open to discussing new opportunities, exploring security research, or just saying hello. Let's connect.