Skip to content
View 7yr4nT's full-sized avatar
:shipit:
:shipit:

Block or report 7yr4nT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
7yr4nt/README.md

Hello, I'm Abhijith Soman πŸ‘‹

🎯 About Me

I'm a cybersecurity professional specializing in Security Operations, Threat Detection, and Security Automation. Through hands-on projects and real-world implementations, I've built enterprise-grade security infrastructure that delivers measurable business impact: 35% attack surface reduction, 30% fewer false positives, and 98% threat detection accuracy.

Technical Focus: Building scalable SOC environments, automating incident response workflows, and implementing comprehensive security monitoring solutions using cutting-edge tools and methodologies.

Industry Recognition: Top 300 Global and Top 50 India on TryHackMe | Microsoft Certified Security Operations Analyst | Active contributor to cybersecurity communities

πŸ’Ό Core Skills & Expertise

πŸ” Technical Competencies by Business Impact

Skill Domain Technologies Business Value
SIEM & Threat Detection Splunk Enterprise, Wazuh, QRadar, Microsoft Sentinel, Graylog Reduced false positives by 30%, improved detection accuracy by 18%
Endpoint Security CrowdStrike Falcon, Microsoft Defender, Carbon Black, LimaCharlie Achieved 98% threat detection across 100+ endpoints
Vulnerability Management Nessus, Qualys, Burp Suite, CVE Analysis, CIS Benchmarks Identified and remediated 500+ CVEs, reduced attack surface by 35%
Incident Response MITRE ATT&CK, TheHive, ThreatConnect, YARA Rules, Playbooks Reduced MTTR by 25% through automated workflows
Security Automation Python, PowerShell, Terraform, Ansible, Splunk SOAR Saved 10+ hours/week through custom automation scripts
Cloud Security Azure Entra ID, AWS Security Hub, Google Cloud SCC, Okta Implemented enterprise IAM with zero security incidents

πŸ› οΈ Technical Arsenal

Network Security

Endpoint Security

SIEM & Analytics

Vulnerability Management

Cloud & Identity

Automation & SOAR

πŸ† Certifications & Achievements

Active Certifications

Key Achievements

  • πŸ₯‡ Top 300 Global & Top 50 India on TryHackMe cybersecurity platform
  • πŸ† Department Leadership - Led cross-functional teams and strategic initiatives for organizational improvement
  • πŸŽ“ Technical Mentor - Guided 30+ professionals in cybersecurity projects and career development
  • πŸ“Š Academic Excellence - Bachelor's in Cybersecurity with 8.2/10 CGPA (Expected 2026)

πŸ› οΈ Hands-On Security Projects

Project Key Technologies Skills Demonstrated Repository
Automated Zero Trust Hybrid Cloud Network Azure, Terraform, Entra ID, pfSense, Tailscale, Docker Hybrid Cloud Architecture, IaC, Zero Trust Security, Identity Management, Network Automation πŸ”— View Project
Azure Entra ID Security Homelab Azure Entra ID, Microsoft Sentinel, Splunk, Sysmon, Terraform, Python Cloud Security Architecture, Identity Management, Threat Detection, Infrastructure as Code πŸ”— View Project
Mini SOC Environment ELK Stack, Wazuh, pfSense, Active Directory, Tines, Mythic C2, Sysmon SOC Operations, Network Security, Incident Response, Attack Simulation πŸ”— View Project
SOAR-EDR Integration Lab LimaCharlie, Tines, Wazuh, VirusTotal API, Atomic Red Team, Metasploit Security Orchestration, Threat Intelligence, EDR Management, Automation πŸ”— View Project
SOC Monitoring Dashboard Splunk, ELK Stack, Prometheus, Shuffle, pfSense, Elastic Defend Data Visualization, Metrics Analysis, Real-time Monitoring, Performance Optimization πŸ”— View Project

|

🎯 Project-Based Skills Matrix

πŸ” Threat Detection & Analysis

  • SIEM Implementation: Built and tuned Splunk, Wazuh, and ELK environments for enterprise-scale log ingestion
  • Correlation Rule Development: Created custom detection rules reducing false positives by 30%
  • Threat Hunting: Implemented MITRE ATT&CK-based hunting queries and detection logic
  • Behavioral Analysis: Developed machine learning-based anomaly detection for user and entity behavior

πŸ›‘οΈ Incident Response & Forensics

  • Playbook Development: Authored standardized IR procedures for common attack vectors
  • Evidence Collection: Automated forensic artifact collection using PowerShell and Python
  • Timeline Analysis: Created comprehensive attack timelines using Sysmon and Windows Event logs
  • Containment Strategies: Implemented automated isolation and remediation workflows

βš™οΈ Security Automation & Orchestration

  • SOAR Development: Built end-to-end automated response workflows using Tines and Shuffle
  • API Integration: Connected 15+ security tools via REST APIs for seamless data flow
  • Infrastructure as Code: Deployed security infrastructure using Terraform and Ansible
  • Custom Scripting: Developed Python tools for threat intel enrichment and bulk operations

🌐 Network & Cloud Security

  • Network Segmentation: Configured pfSense firewalls with 20+ security rules and VLANs
  • Traffic Analysis: Performed deep packet inspection using Wireshark and Suricata
  • Cloud Security Posture: Implemented Azure security baselines and compliance monitoring
  • Identity Security: Configured conditional access policies and privileged access management

πŸ“Š Security Metrics & Reporting

  • Dashboard Creation: Built executive-level security dashboards with KPIs and SLAs
  • Metrics Analysis: Tracked MTTD, MTTR, and other critical security performance indicators
  • Risk Quantification: Developed methodologies for measuring security posture improvements
  • Compliance Reporting: Generated automated compliance reports for multiple frameworks

βš–οΈ Compliance & Risk Management

Framework Expertise & Implementation

Framework Implementation Experience Business Impact
NIST Cybersecurity Framework Designed security program maturity roadmap for 3 organizations Enhanced security posture alignment with business objectives
ISO 27001/27002 Implemented 15+ security controls with automated compliance monitoring Reduced audit preparation time by 65%
SOC 2 Type II Built continuous monitoring dashboards for trust service criteria Achieved 100% control effectiveness during audit
PCI-DSS Automated cardholder data environment monitoring and reporting Maintained compliance across 500+ endpoints with zero violations
MITRE ATT&CK Integrated framework into detection rules and incident response playbooks Improved threat attribution accuracy by 45%

Risk Assessment & Quantification

  • Risk Methodology: Implemented FAIR (Factor Analysis of Information Risk) framework
  • Vulnerability Scoring: Developed custom CVSS environmental scoring for business context
  • Business Impact Analysis: Created automated risk dashboards for executive reporting
  • Compliance Automation: Built Python scripts for continuous compliance monitoring

Operational Efficiency Metrics

  • Incident Response Time: Reduced MTTR by 25% through automated playbooks
  • Alert Fatigue Reduction: Decreased false positives by 30% via intelligent correlation
  • Compliance Overhead: Cut audit preparation time by 65% using automated reporting
  • Team Productivity: Saved 400+ analyst hours annually through security automation

🌟 Community Leadership & Knowledge Sharing

Technical Community Contributions

Platform Role Impact Specialization
Reddit r/cybersecurity Top 1% Contributor & Commenter 50,000+ community karma, trusted advisor SOC Operations, SIEM Implementation
Reddit r/sysadmin Top 1% Contributor & Commenter Expert-level technical guidance Security Automation, Windows Hardening
Reddit r/ITSupport Top 1% Contributor & Commenter Mentored 200+ IT professionals Incident Response, Security Tools
Reddit r/homenetworking Top Contributor Network security best practices Firewall Configuration, Network Monitoring
Reddit r/blueteamsec Top 1% Contributor & Commenter Threat hunting and detection techniques Blue Team Tactics, DFIR

Educational Impact & Mentorship

  • University Workshop Instructor: Conducted 15+ hands-on cybersecurity workshops for 300+ students
  • Student Mentorship Program: Guided 30+ university students in career development and technical skills

🎯 Currently Working On

  • πŸ”¬ Advanced threat hunting techniques using MITRE ATT&CK framework
  • πŸ€– Building AI-powered SOAR workflows for automated incident response
  • πŸ“š Contributing to open-source security tools and creating educational content
  • πŸŽ“ Preparing for advanced cybersecurity certifications (GCIH, GCFA)
  • 🌐 Expanding compliance automation capabilities across multiple frameworks

πŸ“« Let's Connect!

I'm always open to discussing cybersecurity challenges, sharing knowledge, and exploring collaboration opportunities. Whether you're a fellow security professional, recruiter, or someone passionate about cybersecurity, feel free to reach out!

Currently seeking: Full-time SOC Analyst roles where I can leverage my hands-on experience in threat detection, incident response, and security automation to contribute to organizational security posture.


"Security is not a product, but a process" - Bruce Schneier

Popular repositories Loading

  1. azure-sama-governance azure-sama-governance Public

    SAMA-Compliant Azure Landing Zone using Terraform.

    HCL 1

  2. 7yr4nt 7yr4nt Public

  3. azure-hybrid-zerotrust-lab azure-hybrid-zerotrust-lab Public

    A fully automated hybrid cloud network on Microsoft Azure using Terraform, pfSense, and a Zero Trust (ZTNA) model with Tailscale. This project demonstrates Infrastructure as Code (IaC), hybrid iden…

    HCL

  4. Automated-SOC-Alert-Triage-Response-Pipeline Automated-SOC-Alert-Triage-Response-Pipeline Public

    This automated SOC pipeline uses n8n to process Splunk alerts. It enriches data with VirusTotal/AbuseIPDB, gets an AI analysis from Gemini, and automatically creates Jira tickets and Slack notifica…