About
Cybersecurity graduate with strong knowledge of Security Operations Center (SOC) operations, including Security Monitoring, Threat Detection, Incident Response, and Log Analysis. Hands-on experience with SIEM tools (Splunk, Wazuh) for log collection, correlation, alert triage, and real-time security monitoring across endpoints and network infrastructure. Proficient in Security Event Analysis using MITRE ATT&CK framework, enabling effective mapping of TTPs (Tactics, Techniques, Procedures) and threat hunting activities. Skilled in Network Traffic Analysis (NTA) using tools like Wireshark, Zeek, tcpdump, with the ability to detect anomalies, malicious traffic, and intrusion attempts. Experience in Endpoint Detection & Monitoring using Sysmon, Windows Event Logs, and familiarity with EDR/XDR concepts for identifying suspicious activities. Knowledge of Threat Intelligence, IOC (Indicators of Compromise), IOA (Indicators of Attack), and basic Threat Hunting methodologies. Familiar with Security Tools & Technologies: Snort (IDS/IPS), Nmap (Network Scanning), Procmon, Firewall (PfSense), and vulnerability scanning basics. Understanding of Cybersecurity Frameworks & Standards: NIST, ISO 27001, and concepts like CIA Triad, Risk Management, and Security Controls. Basic scripting skills in Python and Bash for automation, log parsing, and security data analysis. Practical exposure to Phishing Analysis, Email Header Analysis, Malware Analysis, and Incident Documentation during internship experience. Built and implemented a Mini SOC Lab Environment using Wazuh, Sysmon, Snort, and Wireshark for log analysis, correlation, and anomaly detection. Experience working with Linux (Kali Linux) and Windows environments, including system monitoring and security testing. Familiar with Ticketing Systems, Incident Lifecycle (Detection → Analysis → Containment → Eradication → Recovery), and SOC workflows (L1 Analyst responsibilities). Strong analytical and problem-solving skills with the ability to prioritize alerts, reduce false positives, and escalate security incidents effectively. Active learner with hands-on practice on platforms like TryHackMe, BlueTeam Labs, CyberDefenders, demonstrating continuous skill enhancement in Blue Team Operations.
Skills & Expertise (30)
Work Experience
Cybersecurity Intern (SOC Analyst)
Redsecops Pvt Ltd
Jun 2024 - Nov 2024
Monitored and analyzed security events using SIEM tools (Splunk, Wazuh) for log analysis, alert triage, and real-time threat detection. Performed log correlation and incident analysis to identify IOCs (Indicators of Compromise) and reduce false positives. Conducted phishing email and header analysis, supporting incident response and threat investigation. Analyzed network traffic using Wireshark and tcpdump to detect anomalies, malicious activity, and intrusion attempts. Assisted in SIEM rule tuning, endpoint monitoring (Sysmon, Windows Logs) and incident documentation following the SOC incident response lifecycle.
Education
Bachelor of Technology in Cybersecurity - SRI INDU College of Engineering & Technology
2021 - 2025 · India
Intermediate (12th – Science) - Sri Nalanda Junior College
2019 - 2021 · India
Secondary School (10th) - Suryodaya High School
2018 - 2019 · India
Certifications
cdsa path
hackthebox · 2026
completed cdsa(sertified defense security analyst) exam path and willing to take exam from hackthebox
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation
Skills (30)
Click a skill to find developers with the same skill