Certified SOC Analyst with 1+ year securing enterprise infrastructure through threat detection, incident response, and adversarial analysis.
I'm a certified SOC Analyst based in Bangalore with a deep focus on blue teaming, real-time threat detection, and digital forensics. Over the past year, I've worked across enterprise security environments handling thousands of incidents weekly — from phishing takedowns to advanced threat hunting using MITRE ATT&CK.
My background in computer science research (UGC NET PhD qualified) gives me a unique analytical lens. I've developed AI-assisted triage workflows using n8n to reduce false positives and accelerate incident response.
Always learning. Always evolving.
Performed advanced threat hunting and incident response across enterprise infrastructure using NDR, EDR, and XDR platforms. Mapped adversary behaviours to MITRE ATT&CK and developed AI-assisted workflows using n8n to correlate alerts and accelerate triage.
Monitored security events in a 24/7 SOC, handling 5,000+ incidents weekly including phishing sites, fraudulent pages, malicious apps, and impersonated profiles. Mentored L1 analysts and executed brand monitoring across surface, deep, and dark web.
Hands-on training in IT infrastructure security, threat hunting, incident response, malware analysis, and SOC operations using industry-grade tools.
Deep packet inspection, network traffic analysis, and threat detection at the network layer.
Endpoint monitoring, behavioural analysis, and rapid containment of endpoint threats.
Unified threat detection across endpoints, networks, and cloud infrastructure.
Real-time log correlation, rule creation, and dashboard-driven threat visibility.
Adversary profiling, IOC analysis, and dark/deep web intelligence gathering.
AI-assisted triage workflows and automation scripts to accelerate incident response.
Command-line tool for detecting phishing domains using OSINT and VirusTotal API. Features subdomain enumeration, email/IP harvesting, HTTP threat scoring, and CSV reporting.
Full SIEM implementation with custom dashboards, correlation rules, and automated alert triaging to reduce analyst workload and improve detection accuracy.
Open to new opportunities, collaborations, and security research discussions.