╔══════════════════════════════════════════════════════════════════════════╗
║ ║
║ ___ __ _________ _____ ║
║ __ | / /_____ _____________ /______ /_ ║
║ __ | /| / /_ __ `/_ ___/ __ /_ _ \ __/ ║
║ __ |/ |/ / / /_/ /_ / / /_/ / / __/ /_ ║
║ ____/|__/ \__,_/ /_/ \__,_/ \___/\__/ ║
║ ║
║ ___ __ ______ ________ ║
║ __ | / /_____ ___ /_______ ______(_) ║
║ __ | /| / /_ __ `/_ __ \ __ `/____ / ║
║ __ |/ |/ / / /_/ /_ / / / /_/ /____ / ║
║ ____/|__/ \__,_/ /_/ /_/\__,_/ ___ / ║
║ /___/ ║
║ ║
║ [ INITIALIZING SECURE CONNECTION... ] ║
║ [ ACCESS GRANTED — CLEARANCE LEVEL: Ω ] ║
╚══════════════════════════════════════════════════════════════════════════╝
Name : Raja Wardet Wahaj
Role : Cybersecurity Analyst | SOC Analyst | Penetration Tester
Status : Final-Year B.S. Computer Science @ University of Chakwal
Clearance : TryHackMe Grandmaster — #17 Globally | Top 1% (1014 rooms)
Focus : Blue Team | Red Team | Threat Intelligence | SIEM Operations
Company : Co-Founder @ SentinelX Cyber
Available : Open to Junior SOC Analyst & Penetration Tester roles"Security is not a product, but a process." — Bruce Schneier
I am a detail-oriented cybersecurity professional with hands-on experience across the full spectrum of offensive and defensive security. My work spans SOC L1/L2 operations, threat intelligence, vulnerability assessment, and penetration testing — backed by real-world internship experience at ISPR (Inter-Service Public Relations) and continuous self-development through 1000+ practical cybersecurity labs.
I co-founded SentinelX Cyber, a cybersecurity startup focused on threat research and offensive security services. I actively monitor live threat feeds, investigate ransomware and phishing campaigns, and map attacker behavior to MITRE ATT&CK TTPs.
🔵 Blue Team / SOC Operations
| Skill | Tools / Platforms |
|---|---|
| SIEM & Log Analysis | Elastic SIEM, Splunk, Kibana |
| Alert Triage | SOC L1 / L2 procedures, Escalation workflows |
| Incident Response | IR Planning, Playbook Development, Post-Incident Reporting |
| Threat Hunting | IOC Extraction, Threat Feed Monitoring |
| Threat Intelligence | MITRE ATT&CK, VirusTotal, Shodan, AbuseIPDB, AlienVault OTX |
| Network Monitoring | Wireshark, Zeek, Snort, Suricata, IDS/IPS |
🔴 Red Team / Penetration Testing
| Skill | Tools / Platforms |
|---|---|
| Web App Pentesting | Burp Suite, SQLMap, OWASP Top 10, XSS, SQLi, CSRF |
| Network Pentesting | Nmap, Nikto, OpenVAS, Netcat, Hydra, Gobuster |
| Exploitation | Metasploit Framework |
| Privilege Escalation | Linux & Windows PrivEsc techniques |
| Post-Exploitation | Lateral Movement, Persistence Mechanisms |
| OSINT & Recon | Shodan, Google Dorks, OSINT Framework |
| Platforms | Kali Linux, Parrot OS, TryHackMe, Hack The Box |
🟡 GRC & Compliance
| Standard | Scope |
|---|---|
| ISO/IEC 27001:2022 | Information Security Management |
| NIST CSF | Cybersecurity Framework |
| OWASP Top 10 | Web Application Security |
| PTES | Penetration Testing Execution Standard |
| CVSS | Vulnerability Scoring & Risk Assessment |
⚙️ Development & Scripting
Python JavaScript Bash PowerShell FastAPI Flask React Node.js Docker Git/GitHub
FastAPIReactSQLAlchemyDockerJWTNginx
A full-stack SaaS platform featuring an advanced Google Dorks generator for OSINT and reconnaissance workflows.
- JWT authentication with role-based access control (Admin / Pro / Free tiers)
- Quota enforcement (1,000 queries/day) with automated daily resets
- 30+ REST endpoints across 7 modular routers with admin analytics dashboard
- Deployed with Docker & Nginx reverse proxy
PythonVirusTotal APIShodanAbuseIPDBMITRE ATT&CK
Automated IOC enrichment pipeline that contextualizes security alerts with real-time threat intelligence.
- Integrates VirusTotal, Shodan, and AbuseIPDB APIs for live indicator enrichment
- Generates structured threat reports mapped to MITRE ATT&CK TTPs
- Reduces manual investigation time through automated correlation
WiresharkSuricataSnortCisco Packet Tracer
Simulated enterprise IDS/IPS environment for detecting malicious network activity.
- Packet-level analysis for port scans, C2 beaconing, and data exfiltration detection
- Custom Suricata/Snort rules with validated logic against real attack simulations
- Detection coverage mapped to MITRE ATT&CK techniques
FlaskReactTypeScriptRSA-2048AES-256PBKDF2
Full-stack data-hiding system with military-grade encryption.
- Supports 9 steganographic operations across image, audio, and video formats
- Hybrid RSA-2048 / AES-256 encryption with PBKDF2 key derivation (100k iterations)
- Per-user cryptographic infrastructure with unique 2048-bit RSA key pairs on registration
Cisco Packet TracerVLANsACLsNetwork Segmentation
Security architecture model for IoT ecosystems.
- Designed with network segmentation, VLANs, and ACLs for least-privilege enforcement
- Simulated real-world IoT traffic patterns and attack scenarios
- Formal research report synthesizing 5+ peer-reviewed papers (2020–2025)
[2026-02] ✅ Junior Cybersecurity Analyst Career Path — Cisco
[2025-12] ✅ Jr Penetration Tester Certificate — TryHackMe
[2025-12] ✅ CompTIA PenTest+ Learning Path — TryHackMe
[2025-12] ✅ Offensive Pentesting Certificate — TryHackMe
[2025-12] ✅ Web Application Pentesting Certificate — TryHackMe
[2025-11] ✅ SOC Level 2 Certificate — TryHackMe
[2025-11] ✅ SOC Level 1 Certificate — TryHackMe
[2025-10] ✅ ISO/IEC 27001:2022 Information Security Associate — SkillFront
[2023-10] ✅ IBM Cybersecurity Analyst Professional Certificate — IBM / Coursera
[2023-09] ✅ Certified Ethical Hacker (CEH) — EC-Council / Coursera
[Present] Co-Founder & Cybersecurity Analyst → SentinelX Cyber (Remote)
[Present] Cyber Threat Researcher → Freelance (Remote)
[2025] Cybersecurity Internship → ISPR, Rawalpindi
[2024-2025] Cybersecurity Analyst → ISPR, Rawalpindi
[2024] Security Intern → Bits Phile, Chakwal
[2024] Software Engineering Fellow → Headstarter (Remote)
| Metric | Value |
|---|---|
| 🏆 Rank | Grandmaster |
| 🌍 Global Position | #17 Globally — Top 1% |
| 🧩 Rooms Completed | 1014 |
| 🎯 Paths Completed | SOC L1, SOC L2, Jr Pentester, CompTIA PenTest+, Offensive Pentesting, Web App Pentesting |
| Platform | Link |
|---|---|
| wardetwahaj.official@gmail.com | |
| linkedin.com/in/wardet-wahaj-0b52571aa | |
| 🎯 TryHackMe | tryhackme.com/p/Wardet.Wahaj |
