
Experience
Cybersecurity professional with strong expertise in Incident Handling, Threat Hunting, and Security Operations, leveraging enterprise security tools and automation scripting to enhance detection accuracy and streamline investigations. Skilled in analyzing diverse telemetry, identifying anomalies, and engineering high-fidelity use cases that strengthen organizational security posture. Proactive learner committed to staying ahead of emerging threats, continuously optimizing processes, and delivering clear, actionable insights to both technical teams and leadership
About Me
I’m passionate about exploring emerging security and technology trends, continuously learning to stay ahead of the evolving landscape. Outside of work, I’m an enthusiastic trekker and runner, having completed Himalayan treks and currently training for upcoming half marathons. I’ve also begun studying Windows and macOS internals
tl;dr
I am experienced in Below Topics:
Microsoft native security platform Analytical Rule, Threat Hunting, KQL and Log Analysis.
Implementing Detection Engineering Stuff in SOC culture.
Pattern based Signature Writting (HEX) and Modify them in Trellix IDS/IPS, Mcafee IDS/IPS.
Experienced in Fine tuning the CJ/Non-CJ Critical stuff for False Positive Fatigue.
Experienced in Static analysis of Exploits, Ransomware, Malware, Virus in SIEM Logs, Crowd strike EDR.
Experienced in analyzing PCAP, Network Flows etc.
Experienced in deep dive Phishing Analysis.
Implemented Various Process and workflow for SOC Team on CJ/Non-CJ, EDR , IDP, Phishing.
What I am Working Towards:
Learning on Hunting Hypothesis Creation with workflow for various CJ/Non-CJ Logs.
Improve My basic Knowledge of Python code Writting to advanced level.
Black Box test obfuscation opportunities.
ONNX, TensorFlow Lite enthusiast for Learning the Models.
Just Looking the Various Security company converting the NexGen SIEM to AI-Models-SIEM (specially Co-pilot).|
Just Looking the Various OEP’s Code being re-used under different Resellers (Hardware Security).