I am a cybersecurity and machine learning enthusiast with hands-on experience in Security Operations Center (SOC) workflows, detection engineering, and intelligent intrusion detection systems. My work focuses on building practical security solutions through home lab simulations, data-driven detection, and deep learning–based anomaly analysis. I am particularly interested in combining network telemetry, SIEM analytics, and machine learning to detect and respond to advanced cyber threats.
To apply my skills in SOC operations, detection engineering, DFIR, and machine learning to develop effective and scalable security monitoring solutions. I aim to contribute to blue-team security operations, threat detection research, and adversarially robust intrusion detection systems while continuously expanding my practical and analytical expertise.
| Skill | Associated Project |
|---|---|
| Machine Learning for Security | Intelligent Intrusion Detection Using Network Flow and System-Level Anomaly Features |
| SOC Home Lab (Hands-on) | Digital Forensics and Incident Response |
| Hands-on Splunk SIEM lab | Hands-on-Splunk-SIEM-lab-covering-Windows-11-Pro-setup-log-forwarding-security-monitoring-attack |
| SIEM Implementation and Log Analysis | Lab |
| Incident Response | Digital Forensics and Incident Response |
| SOC-style investigation and documentation | Applied-Cybersecurity-Incident-Response-Web-Attacks-and-Secure-System-Design |
| Threat Modelling and Risk Assessment | Secure-Biometric-System-Design-Requirements-Threat-Analysis-and-Network-Architecture |
| Network Traffic Monitoring and Attack Detection | Lab |
| Security Automation with Shuffle SOAR | SOC Automation Lab |
| Incident Response Planning and Execution | SOC Automation Lab |
| Case Management with TheHive | SOC Automation Lab |
| Scripting and Automation for Threat Mitigation | SOC Automation Lab |
- SOC Home Lab (Hands-on)
- Detection Lab
- SOC Automation Project
- Intelligent Intrusion Detection Using Network Flow and System-Level Anomaly Features
- Secure-Biometric-System-Design-Requirements-Threat-Analysis-and-Network-Architecture
- Digital Forensics and Incident Response
- Hands-on-Splunk-SIEM-lab-covering-Windows-11-Pro-setup-log-forwarding-security-monitoring-attack
- Applied-Cybersecurity-Incident-Response-Web-Attacks-and-Secure-System-Design