π A Cyber Security Analyst with hands-on experience in vulnerability management, threat intelligence, and backend software development. I specialize in Python-based tool development, API design, and process automation, contributing to security and efficiency across organizations like STM, ASELSAN, and the Ministry of Justice.
π Cyber Security Analyst & Software Developer
π§ Email: amithatdemirkol@gmail.com
π LinkedIn: amithatdemirkol
π» GitHub: amithatdemirkol
π Cyber Security Specialist
- Currently working at STM as a Candidate Engineer, focusing on cyber threat analysis, security incident monitoring, and developing Python-based tools for threat intelligence.
- Experienced in automating workflows and improving detection processes using custom scripts and frameworks.
- Delivered detailed cyber threat analysis reports to strengthen security postures.
π Backend Software Developer
- Developed and deployed 11 APIs at ASELSAN using modern design patterns, MongoDB, and SQL Server.
- Delivered API solutions tailored to enterprise-grade projects, enhancing scalability and efficiency.
- Contributed to the development of tools for subdomain management and email automation at the Ministry of Justice, streamlining operations.
π Graduation Project: Low-Interaction Modular Honeypot
- Designed and developed a modular honeypot system capable of imitating popular network services such as HTTP, SSH, FTP, SMTP, and Telnet to bait attackers and gather threat intelligence.
- Integrated a protocol tunneling feature, enabling multiple services to operate on a single port, making it suitable for deployments behind restrictive firewalls.
- Built a user-friendly Web UI for real-time monitoring and analysis of malicious activities, including IP-based statistics, geolocation insights, and malicious IP lookups.
- Logged detected attacks into a centralized database, allowing easy expansion of the honeypot's capabilities with additional modules or services.
- Implemented a web-based simulation of the Enigma Machine, a historic cryptographic device used during WWII.
- Built with Flask, allowing users to encrypt and decrypt messages interactively through an intuitive web interface.
- Designed with a focus on educational use, showcasing the logic behind early encryption mechanisms.
- Developed a Python-based network port scanner for identifying open ports and services on a target system.
- Utilized socket programming to perform comprehensive scans and generate actionable outputs.
- Optimized for performance and accuracy, making it a lightweight and effective tool for network reconnaissance.
- Created a malware analysis toolkit for extracting critical metadata from suspicious files.
- Leveraged Python libraries to inspect file headers, analyze file signatures, and detect potential threats.
- Provides clear, organized outputs to assist analysts in quick identification of malicious indicators.
Python | C/C++ | Flask | Network Protocols | Cyber Threat Intelligence
API Development | Vulnerability Management | Process Automation
π Teknofest 2023 Finalist β PARDUS 21 Bug Catching and Suggestion Contest.
π High Honor Student β Recognized for academic excellence.
π CCNA Certified β Skilled in networking and protocol analysis.
π Developed:
- A subdomain management tool and email automation system at the Ministry of Justice.
- Advanced APIs and backend solutions at ASELSAN to support various enterprise applications.
- GitHub: amithatdemirkol
- LinkedIn: amithatdemirkol
- HackerRank: amithatdemirkol
- TryHackMe: amithatdemirkol
- Project Euler: kuerta