Hi, I’m Rokibul and a Cybersecurity Specialist

I specialize in cybersecurity solutions aimed at safeguarding both businesses and individuals from a range of cyber threats. With hands-on experience in various cybercrime cases, including cryptocurrency scams, blackmailing, device forensics, fraud, and IoT hacking, I offer comprehensive services. From investigating devices to scanning networks and examining IT systems, my approach is to identify potential threats and respond swiftly to defend against them.

My background includes roles as a Linux Administrator at MakeMyPrivacy, where I managed threat and vulnerability, monitored systems, and provided virtual IT support. Additionally, I've served as a Research and Development Engineer at CEHExam Network, honing skills in data analysis, auditing, SaaS, team leadership, operations research, and data security. Through successfully resolving numerous cybercrime, security, and digital forensics cases, I've contributed to business objectives and growth.

My career journey so far

My career trajectory and responsibilities were outlined across all listed roles and job positions.

Download CV
  1. MakeMyPrivacy Limited

    Feb 2019 - Feb 2020

    Cybersecurity Analyst

    MakeMyPrivacy Limited

    During my time as a Cyber Security Analyst at MakeMyPrivacy Limited from February 2018 to February 2019, I led various security measures to protect our digital infrastructure. My duties included Security Monitoring and Incident Response, Threat Detection, and Analysis, utilizing advanced Security Tools like SIEM and IDS/IPS. I also conducted Vulnerability Assessments and Incident Handling, ensuring we stayed ahead of potential threats. Additionally, I focused on Malware Analysis, Network Traffic Analysis, and Log Analysis to strengthen our defenses and conducted tailored training programs to promote Security Awareness. My attention to detail allowed me to conduct Risk Assessments and offer effective mitigation solutions, while my expertise in Incident Triage and Cyber Threat Intelligence improved our incident response capabilities. I emphasized Security Documentation and Reporting to uphold data protection and overall security standards.

  2. MakeMyPrivacy Limited

    Feb 2020 - Sept 2021

    Cybersecurity Engineer

    MakeMyPrivacy Limited

    Transitioning to the role of Cyber Security Engineer at MakeMyPrivacy Limited from March 2019 to August 2021, I led key initiatives to bolster digital defenses and maintain data integrity. Specializing in Network Security and Security Architecture, I designed robust frameworks to counter emerging threats and conducted comprehensive Vulnerability Assessments and Penetration Testing. My swift Incident Response strategies, coupled with advanced Security Monitoring techniques, ensured real-time threat detection and response. I also focused on Identity and Access Management (IAM) and Encryption to fortify access controls and data confidentiality, while ensuring Security Compliance and leveraging Threat Intelligence Analysis to anticipate potential threats. Contributing to Cloud Security initiatives and conducting thorough Security Assessment and Auditing, I implemented resilient security protocols across various environments, streamlining operations through Scripting and Automation.

  3. DITECH Limited

    Oct 2021 - Jul 2022

    Cybersecurity Specialist

    DITECH Limited

    As a Cyber Security Specialist at DITECH from October 2022 to July 2023, I played a critical role in safeguarding digital infrastructure against diverse threats. Emphasizing Threat Detection and Analysis, I swiftly responded to incidents with meticulous protocols, utilizing advanced Security Tools such as SIEM and IDS. I managed Vulnerability Management processes, ensuring adherence to stringent Security Policies, and conducted rigorous Risk Assessment and Mitigation strategies to fortify Network Security. Proficient in Identity and Access Management (IAM) and Compliance, I also engaged in Cyber Threat Intelligence and System Hardening initiatives, alongside comprehensive Security Assessment and Auditing practices. My broad experience with various Solutions Platforms enriched my capability in mitigating evolving cyber threats.

  4. MakeMyPrivacy Limited

    Sep 2022 - Present

    Cybersecurity Consultant

    MakeMyPrivacy Limited

    Transitioning to my role as a Cyber Security Consultant at MakeMyPrivacy Limited since September 2021, I've been instrumental in developing and implementing robust cybersecurity strategies tailored to client needs. My responsibilities span advising on Security Risk, Incident Response, Penetration Testing, Cloud Security, Network Security, and Application Security. Specializing in Identity and Access Management (IAM), I ensure stringent access controls to protect sensitive data and provide expert guidance on Security Awareness and Training. Leveraging Threat Intelligence and Digital Forensics expertise, I offer proactive insights into emerging risks and assist in forensic investigations when needed. Additionally, I focus on securing the Internet of Things (IoT) landscape, ensuring comprehensive protection across digital domains.

  5. CodeZain Limited

    Mar 2024 - Present

    Head of Information Technology

    CodeZain Limited

    As the Head of Information Technology at CodeZain Limited since March 2024, I lead the company's IT evolution to align with strategic objectives. Prioritizing IT Strategy Development and Planning, I ensure the seamless operation and security of networks, servers, and storage systems. Championing Cybersecurity Oversight, I establish robust policies and procedures, fortifying digital assets against evolving threats. Through Team Leadership and Mentorship, I cultivate a culture of excellence, empowering IT professionals to thrive. Managing Vendor Relationships and Contracts, I optimize resources and spearhead Project Management initiatives to ensure successful IT project delivery. Lastly, I uphold IT Governance and Compliance standards, providing guidance on regulatory adherence and risk management practices across business operations.

  6. I am currently here in my journey :D

Check my Github Repositories

Explore my GitHub repositories focused on cybersecurity. You'll find tools for penetration testing, malware analysis, incident response, secure coding practices, and network security. Feel free to browse, use, and contribute to these projects to enhance your cybersecurity knowledge and defenses.

Follow me on Github
Workstation setup
Keyboard and mouse

A simple stack that you can always trust

From humble beginnings, I've grown to resolve over 350 cybersecurity cases, serving a diverse clientele of more than 300 clients from around the globe. My journey reflects a commitment to excellence and a passion for protecting digital assets.


  • ❖ Global Reach: Successfully resolved cybersecurity issues for clients in multiple countries.
  • ❖ Diverse Clientele: Assisted individuals, small businesses, and large corporations.
  • ❖ Expert Solutions: Specialized in identifying and mitigating a wide array of cybersecurity threats.
  • ❖ Client Satisfaction: Consistently received positive feedback for effective and timely solutions.
  • ❖ Cutting-Edge Techniques: Utilized the latest technologies and methodologies to stay ahead of emerging threats.
  • ❖ Trusted Advisor: Built long-term relationships with clients, becoming their go-to expert for all cybersecurity needs.

300+ Clients have loved my work

Expertise with Leading Cybersecurity Solutions

Highlighting my deep expertise with industry-leading cybersecurity providers.

Essential Tools and Resources

A curated list of essential cybersecurity tools and websites for penetration testing, network analysis, and malware analysis.

Operating System

Kali Linux

PT Framework

Metasploit

Network Analysis

Wireshark

Network Analysis

Nmap

WebApp Sec

Burp Suite

WebApp Sec

OWASP ZAP

Cracking

Hydra

Cracking

Aircrack-ng

OSI & Forensics

Maltego

OSI & Forensics

Autopsy

IDP.

Suricata

SIEM

Splunk

SIEM

AlienVault OSSIM

V. Scanner

OpenVAS

V. Scanner

Nikto

Security Tools

SecTools

Exploits and V.

Exploit Database

Exploits and V.

Packet Storm

Career Pathways

Cyber Seek

Security News

ThreatPost

Security News

Dark Reading

IoT Security

Shodan

Subscribe to my newsletter

Receive my case study and the latest articles on my WhatsApp Channel.