Threat detection at engineering speed

Azure SentinelWiresharkNmapNessusTensorFlowBash/PythonCEH PreparationCyber Security Training (IIT Guwahati)

I HAD EXPOSURE FROM:

BIT MESRAIIT GUWAHATIIIT PATNATEACHNOOKDRISTI-NGO

Academics

A security-focused computer science foundation supplemented with formal training in modern cyber security.

Birla Institute of Technology, Mesra

Bachelor of Technology in Computer Science and Engineering

  • Core CS foundations with focus on systems, security, and software engineering.
2021 – 2025

IIT Guwahati

Cyber Security Training Programme

  • Relevant coursework: Operating System, Database Management System, Cryptography and Network Security, Object Oriented Programming, OWASP Top 10.
2024 – 2025

About Me

Cybersecurity Analyst specializing in SOC operations, threat detection, and offensive security. I blend attacker mindset with defensive operations to detect threats faster, reduce false positives, and strengthen security posture.

Core Expertise

SOC Operations & Threat Detection

SOC MonitoringThreat DetectionSIEM OperationsEvent Correlation

Incident Response & Analysis

Incident ResponseLog AnalysisMalware AnalysisNetwork Forensics

Offensive Security

Vulnerability AssessmentOSINTPenetration TestingCEH Methodology

Automation & Scripting

Python AutomationBash ScriptingWorkflow AutomationTool Development

Tools & Technologies

SIEM & Security Platforms

SplunkAzure SentinelWazuh

Network Analysis

WiresharkNmapPacket Analysis

Security Testing

NessusBurp SuiteKali Linux

Development & Automation

PythonBashSQLn8n

Analytical

Pattern detection, log correlation, and scenario-based reasoning with attacker-to-defender mindset.

Automation

Python and Bash scripting for OSINT tools, SOC utilities, and workflow automation.

Dual Perspective

Unique ability to blend offensive security logic into defensive operations for better threat detection.

Premium security outcomes come from reasoning, context, and execution.

Signal-driven SIEM engineering beats alert noise

I design detection workflows in Azure Sentinel with KQL, ASIM normalization, and correlation logic so analysts see high-confidence signals, not clutter.

Network forensics turns packets into intent

From Wireshark/tcpdump to anomaly visualization, I decode C2 patterns, beaconing, and protocol misuse to surface attacker behavior early.

Security research that blends AI with execution

I pair symbolic + concolic analysis for smart contracts with ML-assisted telemetry to prioritize exploitability and reduce false positives.

Certificates

Professional certifications and training programs from leading institutions and platforms. Verified credentials in cybersecurity, blockchain, and social leadership.

Privacy-first research

My research does not compromise data integrity. I use sandboxed environments and isolated tenant logic for all security testing.

Least-privilege execution

Architecting security workflows that only use the exact endpoints and secrets required, reducing accidental cross-task data exposure.

Isolated environments

Every security test runs in fresh, disposable containers with strict resource usage controls and forensic-grade log capture.

Audit-grade reporting

Producing actionable proof-of-concepts and evidence-backed remediation paths that hold up under strict enterprise security audits.

Internship & field experience

Places where I turned theory into practice—from research internships to real-world documentation and coordination work.

IIT Patna — Code Vulnerability Analytic and Research Intern

May 2024 – July 2024

Conducted symbolic and concolic execution on Solidity smart contracts to identify vulnerabilities, leveraging LLMs and advanced analysis techniques for smart contract security.

Teachnook — Trainee & Intern

Jan 2024 – Feb 2024

Gained hands-on exposure to network security and malware analysis: identifying and mitigating potential threats, and analyzing malware behavior to understand network vulnerabilities.

Dristi NGO, Deoghar — Documentation Head

Aug 2022 – Aug 2024

Led documentation for a social-impact NGO: managed a team, organized security-sensitive records, and ensured accurate, efficient communication across stakeholders.

Featured Projects

Real-world security solutions and research initiatives

Solorigate Incident Response

AZURE SENTINEL SIEM

Engineered end-to-end incident detection workflow. Utilized ASIM and KQL to normalize multi-source telemetry and streamline forensic handover.

AZURE SENTINELKQLASIMTHREAT HUNTING

Global Threat Visualization

HONEYPOT & AZURE SENTINEL

Designed and deployed a honeypot to capture real-world attack data. Visualized 20,000+ malicious logon attempts on a world map.

AZURE SENTINELHONEYPOTKQLVISUALIZATION

Zero Trust Architecture

ELK CONSULTING CASE STUDY

Developed a consulting-level case study for a crypto exchange's network perimeter. Recommended and designed a Zero Trust model.

ZERO TRUSTELK STACKNETWORK DESIGNCONSULTING

Threat Intelligence Integration

SOC L1 ANALYST FRAMEWORK

Demonstrated comprehensive Threat Intelligence Integration for SOC L1 Analysts. Built frameworks for threat detection, analysis, and response workflows.

THREAT INTELLIGENCESOC OPERATIONSPYTHONFRAMEWORK

Security Assessment via SDLC

DEVSECOPS METHODOLOGY

Implemented security assessment practices integrated throughout the Software Development Lifecycle. Automated security checks and vulnerability scanning in CI/CD pipelines.

DEVSECOPSSDLCSECURITY ASSESSMENTAUTOMATION

Incident Response Framework

CYBERSECURITY OPERATIONS

Developed comprehensive incident response procedures and playbooks. Designed workflows for detection, containment, eradication, and recovery phases.

INCIDENT RESPONSEFORENSICSPLAYBOOKSOPERATIONS

Technical Skills

Technologies and tools I work with daily

Programming Languages

Python, Bash, SQL, PowerShell

Libraries & Data

TensorFlow, Pandas, NumPy, Regex/re, Socket, PyAutoGUI & more

Security Domains

Network Analysis, Malware Analysis, OS Hardening, Log Analysis

Tools & Technologies

Azure Sentinel, AndroGuard, Nmap, Wireshark, Nikto, Nessus, Hashcat, Aircrack-ng, n8n