Back to Developers
Kalash Mahajan

Kalash Mahajan

SOC Analyst

70
Profile Score

Skills & Expertise (58)

Security Operations & Incident Response Intermediate
7.3/10
1
Years Exp
Threat Detection Intermediate
7.3/10
1
Years Exp
SIEM Monitoring Intermediate
7.1/10
1
Years Exp
ELK Stack Intermediate
7.0/10
1
Years Exp
Microsoft Security ecosystem Intermediate
6.8/10
1
Years Exp
Scapy Threat Intelligence Checks Nmap Scanning PCAP Analysis WIRESHARK Snort ids Sysmon Telemetry Windows Event Logs Endpoint & Network Monitoring Severity Classification SLA-based Response Handling ServiceNow Incident Lifecycle Bash Firewall Configuration iptables Vulnerability & Risk Assessment OpenVAS Vulnerability Scanning CVE Mapping CVSS Prioritization Scripting & Security Automation Python Scapy python-nmap pyshark PowerShell Detection Rule Development Alert Triage Incident Investigation Event correlation Escalation Handling SOC Operations Incident Documentation SIEM & Detection Engineering Elasticsearch Logstash Kibana Wazuh Log ingestion Log Normalization Alert Enrichment Security Event Correlation Dashboards KQL Microsoft Sentinel Microsoft Defender for Endpoint Microsoft 365 Defender Microsoft Entra ID Logs Azure Activity Logs Sentinel Analytics Rules SOAR & SOC Workflow SOAR concepts Sentinel Playbooks

Work Experience

SOC Analyst

CyArt Tech LLP

Jan 2026 - Present

Designed and deployed a SOC monitoring environment using ELK Stack for centralized log ingestion, normalization, indexing, and visualization of endpoint and network telemetry. Integrated Windows Event Logs and Sysmon telemetry into SIEM pipelines enabling real-time security monitoring, event correlation, and threat detection. Developed and tuned Wazuh detection rules to identify brute-force authentication attempts, privilege abuse, repeated login failures, and anomalous system activity, while reducing false positives. Performed alert triage and incident investigations across endpoint, authentication, and network telemetry, reconstructing attack timelines and supporting escalations. Built Kibana dashboards and investigation queries to analyze event chains and surface high-fidelity alerts. Engineered Snort IDS rules for reconnaissance detection (port scans, SYN flood attempts) and validated detections through Scapy-generated simulations and Metasploit adversary testing. Performed PCAP analysis using Wireshark and vulnerability assessments using Nmap/OpenVAS to investigate threats and prioritize remediation using CVE and CVSS scoring. Applied MITRE ATT&CK framework mapping during investigations and documented incident timelines and SOC analysis reports.

Tech Intern

Fibmesh

Aug 2025 - Dec 2025

Evaluated secure deployment models for static public IP allocation (NeuConnect) including RDP, FTPS/SFTP, HTTPS APIs, and webhook services. Built controlled infrastructure environments to validate remote access paths, DNS/TLS configurations, and firewall policies. Conducted service exposure analysis, testing interface bindings, certificate configurations, and IPv4/IPv6 resolution to minimize attack surface. Implemented least-privilege firewall rules and performed controlled break-testing of connection flows. Presented security architecture and risk analysis to stakeholders and produced deployment guides and demo environments.

Education

B.E. Information Technology (Honors in Cyber Security & Privacy) - Savitribai Phule Pune University (SPPU)

2021 - 2025 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 0/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 70/100

Profile Overview

Member sinceJun 2025

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (58)

Security Operations & Incident Response Threat Detection SIEM Monitoring ELK Stack Microsoft Security ecosystem Scapy Threat Intelligence Checks Nmap Scanning PCAP Analysis WIRESHARK +48 more