Security Operations Analyst | Threat Intelligence Enthusiast
π India | π CEH Certified | πΌ Blue Team Specialist
Hi there! I'm Prakhar, a security analyst with a hacker's mindset and a defender's heart.
I specialize in threat detection, incident response, and malware analysis. My work focuses on automating SOC processes and building threat-aware detection rules mapped to MITRE ATT&CK.
π Iβm currently working on:
- Building a custom Threat Intel pipeline using OTX + MISP
- Enhancing my malware analysis lab with dynamic capabilities
- Practicing SOC playbooks with LetsDefend and TryHackMe labs
A complete end-to-end automated detection and response setup using:
- π» Windows + Sysmon logs
- π‘οΈ Wazuh + TheHive
- βοΈ Shuffle SOAR workflows
- π¬ VirusTotal enrichment
π Real-time alert triage, IOC correlation, and auto case creation.
Reverse-engineering setup with FLARE VM:
- π§ PE analysis, string extraction, obfuscation detection
- π οΈ Tools used: PEStudio, FLOSS, XORSearch, UPX
- π Documented each sample for repeatability
- π§© Wrote 150+ Sigma rules mapped to ATT&CK
- π Built visual dashboards for detection insights
- π Automated IOC lookup & case escalation
Category | Tools Used |
---|---|
π§ SIEM & Monitoring | Splunk, ELK Stack, Microsoft Sentinel |
π‘οΈ Threat Intel | MISP, OTX, AbuseIPDB |
π Malware Analysis | FLARE VM, Ghidra, IDA Pro, CAPE, YARA |
π₯οΈ Endpoint Security | Sysmon, Defender ATP, CrowdStrike |
π§° SOAR & Case Mgmt | Shuffle, TheHive |
π§βπ» Scripting | Python, PowerShell, Bash |
- β CEH β Certified Ethical Hacker
- β Blue Team Labs β LetsDefend (SIEM, Malware, IR, Threat Hunting)
- β TryHackMe β Ongoing labs for Red + Blue side knowledge
- π LinkedIn
- π Email: prakharvr02@example.com (replace with your actual one)
- π GitHub: github.com/prakharvr02
Thanks for visiting! If you're a recruiter, collaborator, or fellow cyber geek β let's team up and defend the digital world together. π‘οΈπ»