I am an aspiring Cybersecurity professional with a strong interest in Security Operations and blue team defense. I have hands-on experience in SOC-related activities such as SIEM monitoring, alert triage, log analysis, and incident investigation through practical labs and real-world simulations.I have worked with tools like Splunk, Wazuh, Snort, and pfSense to detect, analyze, and respond to security events. My experience includes creating custom detection rules, reducing false positives, analyzing network and endpoint logs, and identifying potential threats across different environments. I also have foundational exposure to vulnerability assessment and traffic analysis using tools such as Kali Linux, Burp Suite, and Wireshark.I am highly motivated to continuously learn and improve my cybersecurity skills by staying updated with emerging threats, attack techniques, and defensive strategies. I enjoy problem-solving, investigating security alerts, and understanding how attackers think in order to build stronger defenses. My goal is to begin my career as a SOC Analyst and grow into a skilled security professional who can contribute effectively to protecting organizations and their digital assets.
Driven by a strong belief in continuous learning and responsibility, I am deeply committed to cybersecurity and security operations. I approach every alert, log, and investigation with focus and precision, understanding that even small details can prevent major incidents. Consistency, discipline, and curiosity guide my daily work in defending systems and networks.
Monitoring security events using SIEM tools to identify suspicious and malicious activity. Focused on early detection and accurate alert validation.
Analyzing and correlating logs from multiple sources to understand attack patterns. Ensuring alerts are investigated with precision and context.
Investigating security incidents and following structured response procedures. Documenting findings clearly and escalating issues when required.
Continuously improving detection rules to reduce false positives. Staying updated on emerging threats and defensive techniques.
Phone Number
Email Address
© 2025 Created with parthick M S