Greatly hearted has who believe. Drift allow green son walls years for blush. Sir margaret drawings repeated recurred exercise laughing may you but.
2025
Brute-Force Detection|
SSH Brute-Force Detection Using Splunk
Simulated SSH brute-force attacks using Kali Hydra and engineered custom Splunk detection rules with regex-based field extraction and time-based correlation to identify, reduce false positives, and alert on high-volume failed authentication attempts.
2025
Snort Integration|
Snort Integration (Splunk & Wazuh)
Deployed and tuned Snort as an IDS, creating 5+ custom rules to detect malicious network activity. Forwarded alerts to Splunk and Wazuh for event correlation, improving detection accuracy and significantly reducing false positives.
2025
Vulnerability Assesment|
Website Security Assesment
Identified and validated five vulnerabilities on live websites using Kali Linux, Burp Suite, and Wireshark. Documented severity, impact, exploitation methods, and remediation steps to reduce risk exposure.
2025
Firewall setup|
Firewall Configuration
Configured and managed a pfSense firewall, including interfaces, NAT, and five or more custom filtering rules. Monitored live traffic and strengthened access control, reducing unnecessary traffic by 20%.
Education
2021-2025B.Tech in Computer Science & Engineering
Bachelor of Technology
Bachelor of Technology (B.Tech) in Computer Science with a strong foundation in programming, networking, and cybersecurity fundamentals.
2025SOC Analyst
Certified SOC Analyst
EC-Council Certified SOC Analyst (CSA) trained in SIEM, IDS/IPS, log analysis, and incident response workflows.
2025CICSA
CICSA
CICSA certification validating knowledge of cybersecurity fundamentals, security controls, and risk awareness.
My Skills
I bring a strong foundation in Security Operations with hands-on experience in monitoring, analyzing, and responding to security events. My skill set combines technical knowledge, analytical thinking, and a continuous-learning mindset to support effective and reliable security operations.
_SIEM & Log Analysis
Experienced in monitoring, analyzing, and correlating security events using SIEM platforms to detect and investigate threats.
_Incident Response
Skilled in alert triage, incident investigation, documentation, and escalation following SOC workflows.
_IDS / Network Security
Hands-on experience with Snort IDS rule creation, tuning, and network traffic analysis to identify malicious activity.
_Firewall & Network Defense
Configured and managed pfSense firewalls, NAT, and filtering rules to strengthen access control and reduce unnecessary traffic.
Aspiring SOC Analyst with hands-on experience in SIEM monitoring, alert triage, and incident investigation. Passionate about strengthening security operations through continuous learning and proactive defense.