Skip to content
View qasimqlf's full-sized avatar
👨‍💻
Working from home | Searching Cyber Security |
👨‍💻
Working from home | Searching Cyber Security |

Block or report qasimqlf

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
qasimqlf/README.md

wave Hey, I'm Qasim Qlf — Welcome to My Cyber Space ⚡

cyber banner

👨‍💻 Detection Engineer | Developer | Cybersecurity Enthusiast

Passionate about Threat Detection, Automation, and Full-Stack Development. Currently building detections, Sigma rules, and hunting logic while exploring new frontiers in cybersecurity.


cyber gif

🧠 About Me

  • 🛡️ Current Role: Detection Engineer (Remote) — specializing in identifying malicious behavior and creating detection logic.
  • 💡 Past: Ex-Software Engineer @ NETSOL Technologies
  • 🧩 Stack: Python · Groovy · JavaScript · C# · SQL · Node.js · React · Elastic Stack · Sigma
  • 🌐 Founder of: qasimqlf.com — sharing cybersecurity blogs, detection guides & research.
  • 🎯 Exploring: EDR, C2 Framework Detection, Threat Hunting, SOC Automation
  • 💬 Quote I Live By: “Detection is not about tools — it’s about understanding adversaries.”

🌍 Connect With Me


📈 GitHub Insights

GitHub Stats GitHub Streak


🧰 Tech Stack


🧪 Featured Projects

🔹 StepbyStep_CyberSecurity — Roadmap for beginners entering cybersecurity
🔹 Interview-Questions-Answers — Complete interview prep resource
🔹 Back_End_Development_and_APIs — Practical API and backend examples


🧠 Current Focus

Threat Hunting | Web Apps | Secure Products | Sigma Rules | EDR Detection | Log Analysis | C2 Detection | SOC Engineering

Pinned Loading

  1. StepbyStep_CyberSecurity StepbyStep_CyberSecurity Public

    A Step by Step Guide for Cyber Security Beginners to Jump into the right path

    11 11

  2. Inverview-Questions-Answers Inverview-Questions-Answers Public

    All Interview Questions with their Answers

    1 4

  3. Back_End_Development_and_APIs Back_End_Development_and_APIs Public

    Until this point, you've only used JavaScript on the front end to add interactivity to a page, solve algorithm challenges, or build an SPA. But JavaScript can also be used on the back end, or serve…

    JavaScript

  4. old_website old_website Public

    HTML 1

  5. HackerRank_solutions HackerRank_solutions Public

    Solutions of All Problem

    TSQL

  6. resume resume Public

    HTML