Fileless attacks exploit trusted system binaries and execute payloads entirely in memory. One...
Cybersecurity Researcher | Author
Cybersecurity Professional, Researcher, and Author specializing in Security Operations (SOC), Threat Intelligence, Penetration Testing, and cyber defense. With a strong foundation in computer science and hands-on SOC experience, focuses on detecting, analyzing, and mitigating advanced cyber threats through both defensive and offensive security methodologies. Holds CEH (EC-Council), CSA (EC-Council), and SOCRadar training, and publishes research-driven content on threat hunting, adversary emulation, blue-team strategies, and incident response best practices.
LinkedIn: https://www.linkedin.com/in/shateel-ac/
B.Sc. in Computer Science & Engineering — University of Liberal Arts Bangladesh (ULAB)
EC-Council Certified SOC Analyst (CSA)
Candidate Name: Shateel Arafat Chowdhury
Certificate No: ECC4619052378
Verify Certificate
EC-Council Certified Ethical Hacker (CEH) — Trained
Candidate Name: Shateel Arafat Chowdhury
Certificate No: 16657
Verify Training
Threat Intelligence Fundamentals for SOC Analysts
View Credential
Mastering Cyber Threat Intelligence for SOC Analysts
View Credential
Mastering Gen AI Tools for SOC Analysts
View Credential
Shateel is passionate about modern SOC methodologies, blue-team operations, and continuous skill growth through research, real-world simulations, and ethical hacking practice.
Earned Badges:
Fileless attacks exploit trusted system binaries and execute payloads entirely in memory. One...
In today's cybersecurity landscape, attackers are getting smarter and stealthier. Traditional...
Learn what Sysmon is, how to install and configure it, and how to forward logs to SIEM tools like...
Subscribe To Our Newsletter
Join our mailing list to receive the latest news and updates from our team.
You have Successfully Subscribed!