I'm a cybersecurity professional specializing in Security Operations, Threat Detection, and Security Automation. Through hands-on projects and real-world implementations, I've built enterprise-grade security infrastructure that delivers measurable business impact: 35% attack surface reduction, 30% fewer false positives, and 98% threat detection accuracy.
Technical Focus: Building scalable SOC environments, automating incident response workflows, and implementing comprehensive security monitoring solutions using cutting-edge tools and methodologies.
Industry Recognition: Top 300 Global and Top 50 India on TryHackMe | Microsoft Certified Security Operations Analyst | Active contributor to cybersecurity communities
| Skill Domain | Technologies | Business Value |
|---|---|---|
| SIEM & Threat Detection | Splunk Enterprise, Wazuh, QRadar, Microsoft Sentinel, Graylog | Reduced false positives by 30%, improved detection accuracy by 18% |
| Endpoint Security | CrowdStrike Falcon, Microsoft Defender, Carbon Black, LimaCharlie | Achieved 98% threat detection across 100+ endpoints |
| Vulnerability Management | Nessus, Qualys, Burp Suite, CVE Analysis, CIS Benchmarks | Identified and remediated 500+ CVEs, reduced attack surface by 35% |
| Incident Response | MITRE ATT&CK, TheHive, ThreatConnect, YARA Rules, Playbooks | Reduced MTTR by 25% through automated workflows |
| Security Automation | Python, PowerShell, Terraform, Ansible, Splunk SOAR | Saved 10+ hours/week through custom automation scripts |
| Cloud Security | Azure Entra ID, AWS Security Hub, Google Cloud SCC, Okta | Implemented enterprise IAM with zero security incidents |
- π₯ Top 300 Global & Top 50 India on TryHackMe cybersecurity platform
- π Department Leadership - Led cross-functional teams and strategic initiatives for organizational improvement
- π Technical Mentor - Guided 30+ professionals in cybersecurity projects and career development
- π Academic Excellence - Bachelor's in Cybersecurity with 8.2/10 CGPA (Expected 2026)
| Project | Key Technologies | Skills Demonstrated | Repository |
|---|---|---|---|
| Automated Zero Trust Hybrid Cloud Network | Azure, Terraform, Entra ID, pfSense, Tailscale, Docker | Hybrid Cloud Architecture, IaC, Zero Trust Security, Identity Management, Network Automation | π View Project |
| Azure Entra ID Security Homelab | Azure Entra ID, Microsoft Sentinel, Splunk, Sysmon, Terraform, Python | Cloud Security Architecture, Identity Management, Threat Detection, Infrastructure as Code | π View Project |
| Mini SOC Environment | ELK Stack, Wazuh, pfSense, Active Directory, Tines, Mythic C2, Sysmon | SOC Operations, Network Security, Incident Response, Attack Simulation | π View Project |
| SOAR-EDR Integration Lab | LimaCharlie, Tines, Wazuh, VirusTotal API, Atomic Red Team, Metasploit | Security Orchestration, Threat Intelligence, EDR Management, Automation | π View Project |
| SOC Monitoring Dashboard | Splunk, ELK Stack, Prometheus, Shuffle, pfSense, Elastic Defend | Data Visualization, Metrics Analysis, Real-time Monitoring, Performance Optimization | π View Project |
|
- SIEM Implementation: Built and tuned Splunk, Wazuh, and ELK environments for enterprise-scale log ingestion
- Correlation Rule Development: Created custom detection rules reducing false positives by 30%
- Threat Hunting: Implemented MITRE ATT&CK-based hunting queries and detection logic
- Behavioral Analysis: Developed machine learning-based anomaly detection for user and entity behavior
- Playbook Development: Authored standardized IR procedures for common attack vectors
- Evidence Collection: Automated forensic artifact collection using PowerShell and Python
- Timeline Analysis: Created comprehensive attack timelines using Sysmon and Windows Event logs
- Containment Strategies: Implemented automated isolation and remediation workflows
- SOAR Development: Built end-to-end automated response workflows using Tines and Shuffle
- API Integration: Connected 15+ security tools via REST APIs for seamless data flow
- Infrastructure as Code: Deployed security infrastructure using Terraform and Ansible
- Custom Scripting: Developed Python tools for threat intel enrichment and bulk operations
- Network Segmentation: Configured pfSense firewalls with 20+ security rules and VLANs
- Traffic Analysis: Performed deep packet inspection using Wireshark and Suricata
- Cloud Security Posture: Implemented Azure security baselines and compliance monitoring
- Identity Security: Configured conditional access policies and privileged access management
- Dashboard Creation: Built executive-level security dashboards with KPIs and SLAs
- Metrics Analysis: Tracked MTTD, MTTR, and other critical security performance indicators
- Risk Quantification: Developed methodologies for measuring security posture improvements
- Compliance Reporting: Generated automated compliance reports for multiple frameworks
| Framework | Implementation Experience | Business Impact |
|---|---|---|
| NIST Cybersecurity Framework | Designed security program maturity roadmap for 3 organizations | Enhanced security posture alignment with business objectives |
| ISO 27001/27002 | Implemented 15+ security controls with automated compliance monitoring | Reduced audit preparation time by 65% |
| SOC 2 Type II | Built continuous monitoring dashboards for trust service criteria | Achieved 100% control effectiveness during audit |
| PCI-DSS | Automated cardholder data environment monitoring and reporting | Maintained compliance across 500+ endpoints with zero violations |
| MITRE ATT&CK | Integrated framework into detection rules and incident response playbooks | Improved threat attribution accuracy by 45% |
- Risk Methodology: Implemented FAIR (Factor Analysis of Information Risk) framework
- Vulnerability Scoring: Developed custom CVSS environmental scoring for business context
- Business Impact Analysis: Created automated risk dashboards for executive reporting
- Compliance Automation: Built Python scripts for continuous compliance monitoring
- Incident Response Time: Reduced MTTR by 25% through automated playbooks
- Alert Fatigue Reduction: Decreased false positives by 30% via intelligent correlation
- Compliance Overhead: Cut audit preparation time by 65% using automated reporting
- Team Productivity: Saved 400+ analyst hours annually through security automation
| Platform | Role | Impact | Specialization |
|---|---|---|---|
| Reddit r/cybersecurity | Top 1% Contributor & Commenter | 50,000+ community karma, trusted advisor | SOC Operations, SIEM Implementation |
| Reddit r/sysadmin | Top 1% Contributor & Commenter | Expert-level technical guidance | Security Automation, Windows Hardening |
| Reddit r/ITSupport | Top 1% Contributor & Commenter | Mentored 200+ IT professionals | Incident Response, Security Tools |
| Reddit r/homenetworking | Top Contributor | Network security best practices | Firewall Configuration, Network Monitoring |
| Reddit r/blueteamsec | Top 1% Contributor & Commenter | Threat hunting and detection techniques | Blue Team Tactics, DFIR |
- University Workshop Instructor: Conducted 15+ hands-on cybersecurity workshops for 300+ students
- Student Mentorship Program: Guided 30+ university students in career development and technical skills
- π¬ Advanced threat hunting techniques using MITRE ATT&CK framework
- π€ Building AI-powered SOAR workflows for automated incident response
- π Contributing to open-source security tools and creating educational content
- π Preparing for advanced cybersecurity certifications (GCIH, GCFA)
- π Expanding compliance automation capabilities across multiple frameworks
I'm always open to discussing cybersecurity challenges, sharing knowledge, and exploring collaboration opportunities. Whether you're a fellow security professional, recruiter, or someone passionate about cybersecurity, feel free to reach out!
Currently seeking: Full-time SOC Analyst roles where I can leverage my hands-on experience in threat detection, incident response, and security automation to contribute to organizational security posture.