Understanding OWASP Top 10: A Practical Guide
Deep dive into the OWASP Top 10 vulnerabilities, their real-world implications, and effective mitigation strategies for web applications.
Read MoreSOC Analyst • Threat Hunter • DFIR • SIEM Monitoring
Specializing in Security Operations, Network Traffic Analysis, and Incident Response.
I am a SOC Analyst with hands-on experience in security monitoring, incident response, and digital forensics, currently pursuing an M.Sc. in IT (Cyber Security) at Gujarat University.
I have worked across multiple cybersecurity internships where my focus has been on blue-team operations, including alert analysis, threat monitoring, and supporting incident investigations. My experience spans both academic labs and real-world environments, allowing me to bridge theory with practical security operations.
What I've actually worked on:
Vulnerability Assessment and Penetration Testing using industry-standard methodologies and tools.
AI-powered IDS development and implementation for real-time network anomaly detection and classification.
Memory forensics, botnet detection, and deep analysis of malicious software using Volatility and Python.
Wireshark, Nmap, Metasploit, Volatility, Burp Suite for comprehensive security analysis.
Network traffic analysis, log analysis, and incident monitoring for proactive threat detection.
Ethical Hacking Essentials (EHE), Digital Forensics Essentials (DFE), Network Defense Essentials (NDE).
EC-Council
Comprehensive understanding of ethical hacking methodologies, penetration testing, and security assessment techniques.
EC-Council
Expertise in digital evidence collection, analysis, and preservation for cybersecurity investigations.
EC-Council
Advanced knowledge in network security, intrusion detection, and defensive security strategies.
Enterprise Network Security Project
Develop an intelligent system to detect network anomalies and potential security threats in real-time across a large enterprise network infrastructure.
Designed and implemented a machine learning-based IDS using Python, leveraging network traffic datasets to train classification models. The system analyzes packet flows, identifies suspicious patterns, and alerts security teams of potential threats.
Network Security Research Project
Identify and analyze botnet activities within network traffic to prevent distributed attacks and protect critical infrastructure.
Developed an integrated detection model combining Wireshark packet analysis with Python-based pattern recognition. The system monitors network behavior, identifies command-and-control communications, and flags potential botnet infections.
Malware Analysis Project
Investigate a suspected malware infection by analyzing memory dumps to identify indicators of compromise and understand the attack methodology.
Conducted comprehensive memory forensics using Volatility framework to extract process information, network connections, and malicious artifacts. Performed deep analysis of memory structures to identify rootkits, hidden processes, and data exfiltration attempts.
Comprehensive Security Operations Portfolio
A comprehensive portfolio demonstrating expertise in Security Operations Center (SOC) operations, proactive threat hunting, and digital forensics & incident response (DFIR). Includes real-world case studies, detection rules, and automation scripts.
Designed and implemented an AI-based IDS using Python to detect network anomalies in real-time. Developed classification models to analyze packet data and identify zero-day threats with high accuracy.
Developed a hybrid detection model integrating Wireshark and Python to analyze C2 communication patterns. Processed pcap files to identify behavioral signatures of botnet infections in encrypted traffic.
Conducted deep-dive analysis of infected system memory using Volatility to extract process lists and network connections. Identified rootkits and hidden indicators of compromise (IOCs) in a simulated Linux environment.
Comprehensive portfolio showcasing SOC operations, threat hunting, digital forensics, and incident response capabilities. Includes memory forensics, malware analysis, detection rules, and AI-powered security solutions.
Jul 2024 - Present
Aug 2022 - Jun 2024
Thoughts on cybersecurity, threat intelligence, and digital forensics
Deep dive into the OWASP Top 10 vulnerabilities, their real-world implications, and effective mitigation strategies for web applications.
Read MoreExploring advanced memory forensics techniques using Volatility framework to identify and analyze malware in memory dumps.
Read MoreHow machine learning is revolutionizing intrusion detection systems, reducing false positives, and improving threat detection accuracy.
Read MoreAnalysis of emerging cybersecurity threats, attack vectors, and proactive defense strategies for the coming year.
Read MoreA comprehensive guide to conducting effective penetration tests, covering reconnaissance, exploitation, and professional reporting.
Read MoreReal-world case study on detecting and analyzing botnet activities using network traffic analysis and behavioral patterns.
Read MoreReady to secure your systems? Let's discuss how I can help protect your digital infrastructure.
Connect & Share
Share This Portfolio
Follow Me
GitHub
Check out my open-source projects and contributions
View ProfileLinkedIn
Connect with me for professional networking
Connect