Istanbul, Istanbul, Türkiye
As a passionate cybersecurity professional, I’ve immersed myself in numerous training programs, R&D projects, and certification courses. Furthermore, I: ⚙️ Hold 25 professional certifications in cybersecurity and Ai. ⚙️ Have contributed to a variety of projects in robotics, embedded systems, and artificial intelligence. ⚙️ Support the community with over 50 research and tutorial videos on YouTube and Spotify podcasts. ⚙️ Authored three books and developed two Udemy courses. ⚙️ Designed a series of four LLM models—SenecaLLM—meticulously fine‑tuned for cybersecurity. My Cybersecurity and Ai Professional Certifications; As a result of the training I have undertaken and the exams I have successfully passed, I have earned the following certifications: Offensive Security Certifications: ⛓️💥 Offensive Security Certified Professional (OSCP) ⛓️💥 Offensive Security Wireless Professional (OSWP) CompTIA Certifications: ⚒️ CompTIA Security Infrastructure Expert (CSIE) ⚒️ CompTIA Security Analytics Expert (CSAE) ⚒️ CompTIA Security Analytics Professional (CSAP) ⚒️ CompTIA Network Security Professional (CNSP) ⚒️ CompTIA Advanced Security Practitioner (CASP+) ⚒️ CompTIA PenTest+ ⚒️ CompTIA CySA+ ⚒️ CompTIA Security+ Global Universities Professional Certificates: 🔩 Harvard Uni. - Computer Science for Cybersecurity 🔩 Harvard Uni. - Professional Certificate in Computer Science for Artificial Intelligence 🔩 Uni. of Chicago - Quantum Computer Systems Design Professional Certification ISO Certification: 🪛 27001 Information Security Internal Auditor (IA) 🪛 42001:2023 Artificial Intelligence Management System Lead Auditor (LA) EC-Council Certifications: 🔨 Associate Certified Chief Information Security Officer 🔨 Certified Penetration Testing Professional (CPENT) 🔨 CEH Master 🔨 Certified Ethical Hacker v10 🔨 Certified Ethical Hacker Practical eLearnSecurity Certifications: ⛏️ Certified Digital Forensics Professional (eCDFP) ⛏️ Web Application Penetration Tester eXtreme (eWPTXv2) ⛏️ Certified Threat Hunting Professional (THPv2) ⛏️ Certified Incident Responder (eCIR) If you ever want advice, feel free to reach out anytime. 🙏🏻😊🧡 “Those who shine a light on others will never be left in the dark...” Medium: https://alican-kiraz1.medium.com/ X: https://x.com/AlicanKiraz0 YouTube: https://www.youtube.com/@AlicanKiraz0 HuggingFace: https://huggingface.co/AlicanKiraz0 Github: https://github.com/alicankiraz1
I oversaw the establishment of SOC, Threat Intelligence, Threat Hunting, Incident Response, and Blue Team Maintenance teams—responsible for ensuring the cybersecurity of various organizations and topologies within the Trendyol Group—and also designed their active operational processes. I worked closely with top management and took part in many of these processes. In the broader security domain, I was involved in managing bootcamps, conferences, and community support projects. By setting up collaborative processes with various teams—such as Fraud, Risk, Information Security, Offensive Security, and Application Security—we integrated a cybersecurity defense approach into many different workflows throughout the company. This allowed us to instill our defensive principles in these teams, thereby expanding our internal incident response capabilities and our threat hunting operations. We also successfully mitigated incidents by effectively managing the organization’s cyber incident response processes. Thanks to the comprehensive incident response plan and procedures in place across the organization, we developed a highly successful model for close collaboration and information exchange with other teams. Additionally, we strengthened the interaction between our SOC and IR teams by designing a “tierless” SOC structure covering everything from L1 to L3. This not only allowed us to make efficient use of our personnel but also provided a highly effective pathway for professional development. I took the lead in organizing many bootcamps across the entire security function. Through these bootcamps, we brought new graduates on board and supported their growth. I also very much enjoy working closely with my teams by joining SOC shifts and accompanying my teammates on their on-call days. For this reason, I actively support internal training sessions, Lunch & Learn events, and Away Days to further develop the team’s dynamics and technical competencies.
I contributed to the establishment of SOC, Threat Intelligence, Threat Hunting, Incident Response, and Blue Team Maintenance teams across multiple organizations and topologies within the Trendyol Group, as well as to the design of their active operational processes. By defining each sub-team’s plans and procedures, we also designed complementary processes to facilitate collaboration with various other teams within the organization.
I have 3 books published on Amazon Kindle / Google Play in the fields of cybersecurity and artificial intelligence. My First Book: The Blue Team's Battle Plan - The subject of our book includes examining cyber security incidents in terms of both the blue and purple teams. It closely examines Cyber Security incidents by explaining the frameworks we have defined. It explains these frameworks from both the offensive and defensive perspectives. MITRE ATT&CK, NIST IR, L.M. It covers frameworks like the Cyber Kill Chain in depth. The use of Open-Source Tools in cyber defense infrastructure is explained and detailed with their installations. It is exemplified by tools such as NIDS, HIDS, Sysmon, Breach and Attack Simulation Tools, and Rsyslog. My Second Book : Advanced Tactical Techniques for Cyber Combat: Ransomware & RaaS Frontline - This book aims to be the definitive guide on ransomware, addressing every facet of this significant cybersecurity challenge. Topics covered include how ransomware is used, who writes it, which threat actors employ it, how these actors launch attacks, the techniques they use, and how we can detect and counteract these techniques. My Third Book : Training LLM Models with Transformers - In our book, we explore in detail the working principles of artificial intelligence, LLM models, how these models can be trained, the training environment, how to prepare training data, and how to write the training code. We will learn in detail how to set up the training environment, use various Transformers libraries, train large LLM models through quantization (LoRA and QLoRA), create datasets in different formats, and grasp the mathematical foundations of artificial intelligence.
I support the community on YouTube with more than 80 research and training videos; I share cybersecurity training, research, and analyses of real-world cyber incidents.
I have two Blue Team Cybersecurity courses on Udemy with over 4,000 students. I offer these courses free of charge to students and researchers worldwide. My goal is to contribute to the global cybersecurity community by providing subtitles in more than five languages.
I have over 50 academic-level articles on cybersecurity, artificial intelligence, embedded systems, and cyber incidents. In my articles, I cover advanced technical topics or conduct in-depth research.