MELUSI SHOKO

CISSP | Cyber Threat Intelligence (CTI) Specialist | SOC Analyst | Incident Response & Threat Hunting Specialist | Log Analysis | Proofpoint AI Email Security Specialist
CISSP
CTI SPECIALIST
SOC ANALYST
INCIDENT RESPONSE
THREAT HUNTING
LOG ANALYSIS
PROOFPOINT AI
shokomelu@gmail.com +263 782 354 610 https://www.linkedin.com/in/shokom95

PROFESSIONAL CERTIFICATIONS

Proofpoint AI Email Security
Verify Proofpoint Credential
Proofpoint Certified AI Data Security Specialist 2025
Verify Proofpoint Data Security Credential
LetsDefend Cyber Defense
Verify LetsDefend Certificate
Mastering Cyber Threat Intelligence for SOC Analysts
View Certificate Details
Fundamentals Of Darkweb Training
Verify Certificate
Certified Cybersecurity Educator Professional (CCEP)
Verify CCEP Credential

SECURITY BADGES & CREDENTIALS

Proofpoint AI Email

Specialist
Proofpoint AI Email Security Specialist

Proofpoint Certified AI Email Security Specialist

2024 Credly

Proofpoint AI Data

Specialist 2025
Proofpoint Certified AI Data Security Specialist 2025

Proofpoint Certified AI Data Security Specialist 2025

2025 Credly

CISSP

Expert
CISSP Certified Information Systems Security Professional

Certified Information Systems Security Professional

2024 Gold Tier

CTI Master

Advanced
Mastering Cyber Threat Intelligence for SOC Analysts

Mastering Cyber Threat Intelligence for SOC Analysts

2023 SOC Radar

Dark Web

Specialist
Fundamentals of Dark Web Training

Fundamentals of Dark Web Training

2023 OSINT

Phishing Expert

Expert
LetsDefend Phishing Expert Badge

Phishing Analysis & Detection Specialist

2023 LetsDefend

Network Cable

Fundamentals
LetsDefend Network Fundamentals Badge

Network Fundamentals & Cable Analysis

2023 Networking

HANDS-ON TRAINING & SKILLS

LetsDefend Platform

Completed extensive hands-on training in real-world cyber defense scenarios

View Full Transcript & Progress

LetsDefend Leaderboard - Zimbabwe

1
shokom
3531 pts
2
btasara
3468 pts
3
mercedessibanda
2298 pts

Scripting & Analysis

Obfuscated JavaScript Bash Script PowerShell Keylogger Batch Downloader Chrome Extension Analysis

Malware & Forensics

Malware Analysis Fundamentals NTFS Forensics Malicious Document Analysis Kernel Exploit Steganography

Defense & Detection

Log Analysis With Sysmon Email Header Analysis Detecting Web Attacks IT Security Fundamentals VoIP Security

DEFENSIVE CAPABILITIES

SECURITY MANAGEMENT

Access Management • Asset Security • Communications Security
Identity Management • Network Security • Risk Management
Security Assessment • Security Engineering • Security Management

SECURITY OPERATIONS

Security Operations • Security Testing • Software Development Security
Cyber Defense • Cybersecurity • Cybersecurity Strategy
Threat Detection • Threat Management • Workflows

AI & CONTENT CREATION

AI Content Creation • Artificial Intelligence (AI) • Counterintelligence
Email Management • Email Processing • Email Security
Email Threat Defense • Human Reliability

MALWARE ANALYSIS

Static/Dynamic Analysis • Sandboxing • Reverse Engineering
YARA Rules • Behavioral Analysis • Indicator Extraction

SOCIAL ENGINEERING

Phishing Analysis • Awareness Training • Attack Simulation
Human Factor Assessment • Defense Strategy

OSINT GATHERING

Digital Footprinting • Dark Web Monitoring
Social Media Intelligence • Infrastructure Mapping

SECURITY OPERATIONS

Cyber Defense Analyst
Security Operations Center | 2021-Present
Monitor and analyze security events, conduct threat hunting, and implement defensive measures. Develop Python scripts for security automation and IOC processing.
$ python threat_intel.py --ioc-file indicators.csv --output report.html
> Processing 247 IOCs...
> Malware families detected: 3
> Threat actors identified: 2
> Report generated: threat_report_2024.html

SECURITY RESEARCH & WRITING

Cyber Security Content Creator
Medium Publication | 2022-Present
Writing technical articles focused on Web Attacks, OSINT techniques, and LetsDefend platform walkthroughs
Story Presentations Views Reads
Investigate Web attack. Letsdefend challenge #blueteam
- 7.2K 4.4K
Email OSINT (open source intelligence for email)
- 6.2K 2.4K
Checking Internet Speed with a Python Script
- 6.1K 2.5K
Analyze malicious .doc file_Letsdefend challenge #blueteam #Malware_Analysis
- 4K 2.1K
# Article Research & Development Workflow
def research_topic(topic):
    gather_osint_sources()
    analyze_attack_vectors()
    create_lab_environment()
    document_findings()
    publish_technical_guide()

Education

Bachelor of Technology in Information Security and Assuarance
Harare Institute of Technology | 2017-2021
Specialized in Threat Intelligence, Digital Forensics, and Defensive Security Operations

SECURE CONTACT

Client-Side Encryption
Bot Protection
Input Sanitization
Timestamp Verification
Formspree Delivery

Secure Email

[Email protected by anti-spam measures]

Protected against email harvesting bots

Encrypted Phone

+263 782 354 610

Telegram available for secure calls

Professional Network

https://www.linkedin.com/in/shokom95

PGP Encryption

Available upon request for sensitive communications

End-to-end encryption for confidential messages
FORMSPREE SECURE DELIVERY ACTIVE

Send Encrypted Message

Maximum 1000 characters for security
Security Features Active: Client-side encryption • Bot detection • Input sanitization • Timestamp verification • Formspree secure delivery to shokom*@gmail.com

LOCATION

Based In

Harare, Zimbabwe

UTC+2 (Central Africa Time)

Availability

Remote & On-site Opportunities

Full remote work capability

Languages

English, Shona

Fluent in technical communication

Harare, Zimbabwe

Map data loaded securely from Google Maps