Saichandram Sadhu

About Me

I am a SOC Analyst with hands-on experience in security monitoring, incident response, and digital forensics, currently pursuing an M.Sc. in IT (Cyber Security) at Gujarat University.

I have worked across multiple cybersecurity internships where my focus has been on blue-team operations, including alert analysis, threat monitoring, and supporting incident investigations. My experience spans both academic labs and real-world environments, allowing me to bridge theory with practical security operations.

What I've actually worked on:

  • Monitoring and analyzing security events using SIEM concepts and network traffic analysis
  • Assisting with incident response workflows and digital forensic investigations
  • Conducting Linux memory forensics and traffic analysis using tools like Wireshark, Volatility, Nmap, and Metasploit
4
Internships
3+
Certifications
M.Sc.
Cyber Security

Core Skills

SIEM (Wazuh, Splunk) & Log Analysis 90%
Network Traffic Analysis (Wireshark) 92%
Incident Response & DFIR 88%
Malware Analysis & Forensics 85%
Python for Security Automation 85%
Vulnerability Assessment 80%

Technical Arsenal

VAPT

Vulnerability Assessment and Penetration Testing using industry-standard methodologies and tools.

Intrusion Detection

AI-powered IDS development and implementation for real-time network anomaly detection and classification.

Malware Forensics

Memory forensics, botnet detection, and deep analysis of malicious software using Volatility and Python.

Security Tools

Wireshark, Nmap, Metasploit, Volatility, Burp Suite for comprehensive security analysis.

Traffic Analysis

Network traffic analysis, log analysis, and incident monitoring for proactive threat detection.

Certifications

Ethical Hacking Essentials (EHE), Digital Forensics Essentials (DFE), Network Defense Essentials (NDE).

Experience

Jan 2026 - Present

Security Operations Center Analyst

Drona Cyber Solutions Pvt Ltd · Internship

  • Performing real-time security monitoring and alert analysis within the SOC environment
  • Investigating security incidents, analyzing logs, and supporting incident response workflows
  • Conducting threat hunting activities to identify potential network anomalies
Jul 2025 - Sep 2025

Cyber Security & Ethical Hacking Intern

Digisuraksha Parhari Foundation

  • Conducted penetration testing and vulnerability assessments across web and network systems
  • Supported digital forensics investigations and assisted in security audits
  • Developed an AI-based Intrusion Detection System (IDS) to classify and analyze network anomalies using Python and traffic datasets
  • Collaborated with mentors to enhance documentation and reporting of findings
Jun 2025 - Jul 2025

Cyber Security Intern

Codec Technologies India

  • Assisted in vulnerability assessment and secure configuration of system endpoints
  • Participated in network monitoring, risk evaluation, and security implementation practices
Jul 2023 - Oct 2023

Cyber Security Researcher (Internship)

Zetpeak

  • Performed vulnerability assessments and provided mitigation recommendations
  • Contributed to proactive monitoring and analysis of security threats

Certifications & Credentials

Ethical Hacking Essentials (EHE)

EC-Council

Comprehensive understanding of ethical hacking methodologies, penetration testing, and security assessment techniques.

2024 Verified

Digital Forensics Essentials (DFE)

EC-Council

Expertise in digital evidence collection, analysis, and preservation for cybersecurity investigations.

2024 Verified

Network Defense Essentials (NDE)

EC-Council

Advanced knowledge in network security, intrusion detection, and defensive security strategies.

2024 Verified

What People Say

"Saichandram demonstrated exceptional skills in vulnerability assessment and penetration testing during our security audit. His attention to detail and thorough analysis helped us identify critical security gaps that we weren't aware of."

Project Manager

Digisuraksha Parhari Foundation

"Working with Saichandram on the AI-powered IDS project was a great experience. His technical expertise in Python and machine learning, combined with his cybersecurity knowledge, resulted in an innovative solution for network anomaly detection."

Senior Security Engineer

Codec Technologies India

"Saichandram's malware forensics work was outstanding. His deep analysis and detailed reporting helped us understand the attack vectors and improve our security posture significantly."

Security Researcher

Zetpeak

Case Studies

AI/ML 2025

AI-Powered Intrusion Detection System

Enterprise Network Security Project

Challenge

Develop an intelligent system to detect network anomalies and potential security threats in real-time across a large enterprise network infrastructure.

Solution

Designed and implemented a machine learning-based IDS using Python, leveraging network traffic datasets to train classification models. The system analyzes packet flows, identifies suspicious patterns, and alerts security teams of potential threats.

Technologies

Python Machine Learning Network Analysis TensorFlow

Results

  • Real-time anomaly detection with 95%+ accuracy
  • Reduced false positives by 40%
  • Automated threat classification and reporting
Forensics 2024

Botnet Detection System

Network Security Research Project

Challenge

Identify and analyze botnet activities within network traffic to prevent distributed attacks and protect critical infrastructure.

Solution

Developed an integrated detection model combining Wireshark packet analysis with Python-based pattern recognition. The system monitors network behavior, identifies command-and-control communications, and flags potential botnet infections.

Technologies

Wireshark Python Traffic Analysis Pattern Recognition

Results

  • Successfully detected multiple botnet variants
  • Reduced detection time by 60%
  • Comprehensive threat intelligence reports
Forensics 2024

Linux Memory Forensics Investigation

Malware Analysis Project

Challenge

Investigate a suspected malware infection by analyzing memory dumps to identify indicators of compromise and understand the attack methodology.

Solution

Conducted comprehensive memory forensics using Volatility framework to extract process information, network connections, and malicious artifacts. Performed deep analysis of memory structures to identify rootkits, hidden processes, and data exfiltration attempts.

Technologies

Volatility Memory Forensics Linux Malware Analysis

Results

  • Identified 15+ indicators of compromise
  • Mapped complete attack timeline
  • Provided actionable remediation recommendations
SOC/DFIR 2024-2025

SOC Threat Hunting & DFIR Portfolio

Comprehensive Security Operations Portfolio

Overview

A comprehensive portfolio demonstrating expertise in Security Operations Center (SOC) operations, proactive threat hunting, and digital forensics & incident response (DFIR). Includes real-world case studies, detection rules, and automation scripts.

Key Components

  • MITRE ATT&CK hypothesis-driven threat hunting
  • Memory forensics with Volatility 3
  • Malware analysis workflows and YARA rules
  • Detection rules (Sigma, KQL, SPL)
  • AI-powered intrusion detection systems
  • Botnet detection and network analysis
  • Forensic timeline reconstruction

Technologies

Python YARA Sigma Volatility Sysmon Wazuh ELK Stack

Featured Projects

AI-Driven Threat Detection System

Designed and implemented an AI-based IDS using Python to detect network anomalies in real-time. Developed classification models to analyze packet data and identify zero-day threats with high accuracy.

Python Machine Learning Threat Detection Packet Analysis

Botnet Traffic Analysis & Detection

Developed a hybrid detection model integrating Wireshark and Python to analyze C2 communication patterns. Processed pcap files to identify behavioral signatures of botnet infections in encrypted traffic.

Wireshark Python Traffic Analysis Botnet Detection

Memory Forensics & Malware Analysis

Conducted deep-dive analysis of infected system memory using Volatility to extract process lists and network connections. Identified rootkits and hidden indicators of compromise (IOCs) in a simulated Linux environment.

Volatility Memory Forensics Malware Analysis DFIR

SOC Threat Hunting & DFIR Portfolio

Comprehensive portfolio showcasing SOC operations, threat hunting, digital forensics, and incident response capabilities. Includes memory forensics, malware analysis, detection rules, and AI-powered security solutions.

SOC Threat Hunting DFIR Python YARA

Education

Master of Science (M.Sc.) in IT - Cyber Security

Gujarat University

Jul 2024 - Present

Bachelor of Science (B.Sc.) in IT - Cyber Security

Gujarat University

Aug 2022 - Jun 2024

Latest Insights

Thoughts on cybersecurity, threat intelligence, and digital forensics

VAPT
Jan 15, 2025 5 min read

Understanding OWASP Top 10: A Practical Guide

Deep dive into the OWASP Top 10 vulnerabilities, their real-world implications, and effective mitigation strategies for web applications.

Read More
Forensics
Jan 10, 2025 7 min read

Memory Forensics: Extracting Malware Artifacts

Exploring advanced memory forensics techniques using Volatility framework to identify and analyze malware in memory dumps.

Read More
IDS
Jan 5, 2025 6 min read

AI-Powered Intrusion Detection: The Future of Network Security

How machine learning is revolutionizing intrusion detection systems, reducing false positives, and improving threat detection accuracy.

Read More
Threat Intel
Dec 28, 2024 4 min read

2025 Cybersecurity Threat Landscape: What to Watch

Analysis of emerging cybersecurity threats, attack vectors, and proactive defense strategies for the coming year.

Read More
VAPT
Dec 20, 2024 5 min read

Penetration Testing Methodology: From Recon to Reporting

A comprehensive guide to conducting effective penetration tests, covering reconnaissance, exploitation, and professional reporting.

Read More
Forensics
Dec 15, 2024 6 min read

Botnet Detection and Analysis: A Case Study

Real-world case study on detecting and analyzing botnet activities using network traffic analysis and behavioral patterns.

Read More

Connect & Share

Let's Work Together

Ready to secure your systems? Let's discuss how I can help protect your digital infrastructure.