Skip to content
View prakharvr02's full-sized avatar
  • New Delhi
  • 03:46 (UTC +05:30)

Block or report prakharvr02

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
prakharvr02/README.md

Prakhar Verma

Cyber Threat Intelligence | Security Analyst


About Me

Experienced Cyber Threat Intelligence and Security Analyst with expertise in threat hunting, OSINT, digital forensics, and risk management. I specialize in identifying, analyzing, and mitigating advanced threats across enterprise environments using a comprehensive toolkit of security technologies and methodologies.


Core Competencies

Cyber Threat Intelligence

  • Threat actor tracking and profiling using MISP, OpenCTI, MITRE ATT&CK
  • Indicator management and sharing via STIX/TAXII
  • Threat feed integration and correlation (AlienVault OTX, ThreatConnect)
  • Malware intelligence analysis
  • Campaign tracking and attribution
  • Intelligence fusion and analysis

Threat Hunting

  • Proactive threat identification using Elasticsearch, Splunk, and LogRhythm
  • Anomaly detection with Zeek, Suricata, and Yara rules
  • Memory forensics with Volatility
  • Host-based hunting with Sysmon and OSQuery
  • Network traffic analysis via Wireshark and NetworkMiner
  • MITRE ATT&CK-based hunting methodologies

OSINT (Open Source Intelligence)

  • Advanced search techniques and Google dorking
  • Social media intelligence
  • Maltego for relationship mapping
  • Passive reconnaissance (Shodan, Censys, OSINT Framework)
  • HUMINT collection and analysis

Security Analyst

  • Security incident detection, triage and response
  • SIEM management (Splunk, ELK Stack, QRadar)
  • Alert correlation and prioritization
  • Endpoint detection and response (EDR) with CrowdStrike, SentinelOne
  • Root cause analysis
  • Incident reporting and documentation

Risk Management

  • Vulnerability assessment and management
  • Security controls evaluation
  • Compliance frameworks (NIST, ISO 27001, CIS)
  • Security architecture review
  • Threat modeling

Digital Forensics

  • Disk imaging and analysis (FTK, Autopsy)
  • Memory forensics (Volatility, Rekall)
  • Network forensics
  • Timeline analysis
  • Incident reconstruction
  • Chain of custody maintenance

Binary Exploitation & Reverse Engineering

  • Buffer overflow analysis
  • Shellcode development
  • IDA Pro, Ghidra for static analysis
  • Dynamic analysis with x64dbg, GDB
  • Firmware analysis
  • Exploit development

Web Application Security

  • OWASP Top 10 vulnerability assessment
  • Web penetration testing (Burp Suite, OWASP ZAP)
  • Authentication bypass techniques
  • API security testing
  • Web shell detection

Technical Skills

Programming Languages

  • C
  • Python
  • Assembly
  • Bash scripting
  • PowerShell

Environments

  • Linux (Kali, Ubuntu, CentOS)
  • Windows Server
  • Cloud environments (AWS, Azure)

Certifications

  • CompTIA Security+ (Udemy)
  • CompTIA CySA+ (Letsdefend)
  • Google Cybersecurity (Coursera)
  • Cyber Threat Intelligence 101 (arcX)
  • Practical Ethical Hacking (TCM Security)
  • Cyber Threat Intelligence (Udemy)

Projects

  • Log Analysis using Splunk
  • Phishing Email Analysis
  • Dark Web Monitoring with OSINT
  • Network Traffic Analysis using Wireshark
  • Yara Rules for Malware Detection

Contact


"Security is always excessive until it's not enough." — Robbie Sinclair

Popular repositories Loading

  1. prakharvr02 prakharvr02 Public

    Config files for my GitHub profile.

  2. Log-Analysis-using-Splunk Log-Analysis-using-Splunk Public

  3. Darkweb-Monitoring-with-OSINT Darkweb-Monitoring-with-OSINT Public

  4. Yara-rules-for-malware-detection Yara-rules-for-malware-detection Public

  5. Network-analysis-using-wireshark Network-analysis-using-wireshark Public

  6. Dark-Web-Monitoring-Tool Dark-Web-Monitoring-Tool Public

    Python