Threat detection at
engineering speed
I HAD EXPOSURE FROM:
Academics
A security-focused computer science foundation supplemented with formal training in modern cyber security.
Birla Institute of Technology, Mesra
Bachelor of Technology in Computer Science and Engineering
- • Core CS foundations with focus on systems, security, and software engineering.
IIT Guwahati
Cyber Security Training Programme
- • Relevant coursework: Operating System, Database Management System, Cryptography and Network Security, Object Oriented Programming, OWASP Top 10.
About Me
Cybersecurity Analyst specializing in SOC operations, threat detection, and offensive security. I blend attacker mindset with defensive operations to detect threats faster, reduce false positives, and strengthen security posture.
Core Expertise
SOC Operations & Threat Detection
Incident Response & Analysis
Offensive Security
Automation & Scripting
Tools & Technologies
SIEM & Security Platforms
Network Analysis
Security Testing
Development & Automation
Analytical
Pattern detection, log correlation, and scenario-based reasoning with attacker-to-defender mindset.
Automation
Python and Bash scripting for OSINT tools, SOC utilities, and workflow automation.
Dual Perspective
Unique ability to blend offensive security logic into defensive operations for better threat detection.
Premium security outcomes come from reasoning, context, and execution.
Signal-driven SIEM engineering beats alert noise
I design detection workflows in Azure Sentinel with KQL, ASIM normalization, and correlation logic so analysts see high-confidence signals, not clutter.
Network forensics turns packets into intent
From Wireshark/tcpdump to anomaly visualization, I decode C2 patterns, beaconing, and protocol misuse to surface attacker behavior early.
Security research that blends AI with execution
I pair symbolic + concolic analysis for smart contracts with ML-assisted telemetry to prioritize exploitability and reduce false positives.
Certificates
Professional certifications and training programs from leading institutions and platforms. Verified credentials in cybersecurity, blockchain, and social leadership.
Privacy-first research
My research does not compromise data integrity. I use sandboxed environments and isolated tenant logic for all security testing.
Least-privilege execution
Architecting security workflows that only use the exact endpoints and secrets required, reducing accidental cross-task data exposure.
Isolated environments
Every security test runs in fresh, disposable containers with strict resource usage controls and forensic-grade log capture.
Audit-grade reporting
Producing actionable proof-of-concepts and evidence-backed remediation paths that hold up under strict enterprise security audits.
Internship & field experience
Places where I turned theory into practice—from research internships to real-world documentation and coordination work.
IIT Patna — Code Vulnerability Analytic and Research Intern
May 2024 – July 2024
Conducted symbolic and concolic execution on Solidity smart contracts to identify vulnerabilities, leveraging LLMs and advanced analysis techniques for smart contract security.
Teachnook — Trainee & Intern
Jan 2024 – Feb 2024
Gained hands-on exposure to network security and malware analysis: identifying and mitigating potential threats, and analyzing malware behavior to understand network vulnerabilities.
Dristi NGO, Deoghar — Documentation Head
Aug 2022 – Aug 2024
Led documentation for a social-impact NGO: managed a team, organized security-sensitive records, and ensured accurate, efficient communication across stakeholders.
Featured Projects
Real-world security solutions and research initiatives
Technical Skills
Technologies and tools I work with daily
Programming Languages
Python, Bash, SQL, PowerShell
Libraries & Data
TensorFlow, Pandas, NumPy, Regex/re, Socket, PyAutoGUI & more
Security Domains
Network Analysis, Malware Analysis, OS Hardening, Log Analysis
Tools & Technologies
Azure Sentinel, AndroGuard, Nmap, Wireshark, Nikto, Nessus, Hashcat, Aircrack-ng, n8n