I’m an aspiring SOC Analyst with strong foundations in monitoring, threat detection, and incident response.
I specialize in log analysis, SIEM dashboards, and handling alerts to reduce false positives and escalate true incidents effectively.
With experience in vulnerability management, network traffic analysis, and secure coding, I bring both a proactive and defensive approach to security operations.
I hold certifications such as Fortinet Certified Fundamentals Cybersecurity, Azure AI Fundamentals, and Qualys Specialist in Cybersecurity Asset Management, which complement my hands-on practice on platforms like Splunk, TryHackMe, and Burp Suite.
My goal is to contribute to a SOC team by strengthening monitoring, automating alert handling, and improving response workflows — aligning with Zoho’s vision of building resilient security infrastructures.
Built a Splunk dashboard to detect brute-force attempts, failed logins, and anomalies in authentication logs. Automated alert rules to reduce response time.
Python + Flask tool to detect hidden keyloggers, integrated with logging to trigger alerts in a SIEM-like environment.
🔗 GitHubImplemented ML-based anomaly detection to identify unusual traffic flows and potential insider threats in monitored logs.