Back to Developers
litheesh kumar

litheesh kumar

soc analyst

india $10/hr
90
Profile Score

About

Security Operations Analyst with hands-on experience in self-build enterprise SOC lab, specializing in SIEM-based threat detection, log analysis, alert triage, and incident investigation. Proficient in wazuh, SIEM, ELK stack, Wireshark and Python Scripting for security monitoring. Strong understanding of TCP/IP, firewall, IDS, IPS, VPN, and endpoint security concepts. Experienced in phishing email analysis, threat detection and mapping attacker technique to MITRE ATT&CK framework.

Skills & Expertise (51)

TCP/IP Advanced
8.5/10
1
Years Exp
Risk Prioritization Advanced
8.5/10
1
Years Exp
CVE/CVSS Analysis Advanced
8.5/10
1
Years Exp
Nmap Advanced
8.5/10
1
Years Exp
LINUX Advanced
8.5/10
1
Years Exp
Windows Server/Desktop Advanced
8.5/10
1
Years Exp
Windows Event Log Analysis Advanced
8.5/10
1
Years Exp
Sysmon Advanced
8.5/10
1
Years Exp
traffic analysis Advanced
8.5/10
1
Years Exp
DNS/HTTP/FTP Analysis Advanced
8.5/10
1
Years Exp
WIRESHARK Advanced
8.5/10
1
Years Exp
MITRE ATT&CK Advanced
8.5/10
1
Years Exp
Threat Detection Advanced
8.5/10
1
Years Exp
SIEM Advanced
8.5/10
1
Years Exp
Metasploit Advanced
8.5/10
1
Years Exp
Log Analysis Advanced
8.5/10
1
Years Exp
Alert Triage Advanced
8.5/10
1
Years Exp
Incident Response Advanced
8.5/10
1
Years Exp
Event correlation Advanced
8.5/10
1
Years Exp
IOC Analysis Advanced
8.5/10
1
Years Exp
Wazuh Advanced
8.3/10
1
Years Exp
ELK Stack Advanced
7.9/10
1
Years Exp
Bash Intermediate
7.2/10
1
Years Exp
Python Intermediate
7.2/10
1
Years Exp
AWS Security Basics Intermediate
7.2/10
1
Years Exp
Incident Ticketing Systems Intermediate
7.2/10
1
Years Exp
Yara Rules Intermediate
7.2/10
1
Years Exp
Regex Intermediate
7.2/10
1
Years Exp
Active Directory concepts Intermediate
7.2/10
1
Years Exp
TheHive Intermediate
7.2/10
1
Years Exp
Burp Suite Intermediate
7.2/10
1
Years Exp
AbuseIPDB Intermediate
7.2/10
1
Years Exp
Shodan Intermediate
7.2/10
1
Years Exp
Virus Total Intermediate
7.2/10
1
Years Exp
MISP Intermediate
7.2/10
1
Years Exp
OpenVAS Intermediate
7.2/10
1
Years Exp
OWASP ZAP Intermediate
7.2/10
1
Years Exp
PowerShell Intermediate
7.2/10
1
Years Exp
Malware Behaviour Analysis Intermediate
7.2/10
1
Years Exp
EDR Concepts Intermediate
7.2/10
1
Years Exp
FIM Intermediate
7.2/10
1
Years Exp
VPN Concepts Intermediate
7.2/10
1
Years Exp
Firewalls Intermediate
7.2/10
1
Years Exp
IDS/IPS Intermediate
7.2/10
1
Years Exp
OWASP Top 10 Intermediate
7.2/10
1
Years Exp
Cyber Kill Chain Intermediate
7.2/10
1
Years Exp
NIST CSF Intermediate
7.2/10
1
Years Exp
XDR Intermediate
7.2/10
1
Years Exp
ISO 27001 Awareness Intermediate
6.5/10
1
Years Exp
Microsoft Sentinel Intermediate
6.5/10
1
Years Exp
Splunk Intermediate
6.5/10
1
Years Exp

Work Experience

SOC Monitoring & Incident Response

Enterprise SOC Lab

Sep 2025 - Nov 2025

Built a multi-machine SOC lab (Windows Server + Ubuntu endpoints) with Wazuh SIEM and ELK Stack for centralized log ingestion, correlation, and real-time security monitoring across all endpoints. Monitored Windows Event IDs 4625, 4672, 4688, and 4698 to detect brute-force attacks, privilege escalation, process injection, and scheduled task persistence; configured Sysmon with custom rules for deep endpoint visibility. Developed and tuned 15+ custom Wazuh detection rules for SSH brute-force, unauthorized Sudo, port scanning, and suspicious PowerShell execution — reducing false positives by refining correlation thresholds and log filters. Executed structured alert triage (P1–P3 severity), performed root cause analysis, and mapped all findings to MITRE ATT&CK: T1110 (Brute Force), T1078 (Valid Accounts), T1046 (Network Scanning), T1053 (Scheduled Task). Built Kibana dashboards for alert trends, top offending IPs, and authentication heatmaps; analysed PCAP files using Wireshark to detect SYN floods, DNS exfiltration, and lateral movement indicators. Captured and analysed network traffic using Wireshark to identify SYN flood attempts, cleartext credential transmission over FTP/Telnet, suspicious DNS exfiltration patterns, and abnormal lateral movement traffic between lab hosts. Documented complete incident reports including timeline, evidence, ATT&CK mapping, and remediation steps — following structured SOC runbook and IR playbook standards.

Vulnerability Assessment

Simulated Enterprise Environment

Dec 2025 - Jan 2026

Conducted full VA lifecycle — scoping, host discovery, service enumeration, vulnerability scanning, exploitation validation, and reporting — across intentionally vulnerable Windows and Linux targets in an isolated lab. Used Nmap for full-port scans, service version detection, and OS fingerprinting; identified exposed RDP, SMB, SSH services and cross-referenced with CVE databases to assess exploitability and patch gaps. Identified OWASP Top 10 vulnerabilities (SQLi, XSS, Broken Auth) using OWASP ZAP; validated critical findings using Metasploit — mapped attack vectors to MITRE ATT&CK T1190, T1021, and T1059. Performed basic exploitation attempts in an isolated lab using Metasploit to validate identified vulnerability (Eternal blue on unpatched SMB), gaining hands – on understanding on how attackers move from initial access to compromise. Delivered a structured assessment report with executive summary, CVSS v3.1 risk ratings, evidence screenshots, and prioritized remediation recommendations — mirroring a real-world penetration testing deliverable.

Education

Mechanical engineer

2018 - 2024 · India

Certifications

AI-Powered Cyber Security

Frontlines Edu Tech · 2026

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 5/5
🏆 Certs 5/5
Verified 5/5
Total Score 90/100

Profile Overview

Member sinceMar 2026

Availability Details

Relocation

Open to Relocation

Skills (51)

TCP/IP Risk Prioritization CVE/CVSS Analysis Nmap LINUX Windows Server/Desktop Windows Event Log Analysis Sysmon traffic analysis DNS/HTTP/FTP Analysis +41 more