Experienced Cyber Threat Intelligence and Security Analyst with expertise in threat hunting, OSINT, digital forensics, and risk management. I specialize in identifying, analyzing, and mitigating advanced threats across enterprise environments using a comprehensive toolkit of security technologies and methodologies.
- Threat actor tracking and profiling using MISP, OpenCTI, MITRE ATT&CK
- Indicator management and sharing via STIX/TAXII
- Threat feed integration and correlation (AlienVault OTX, ThreatConnect)
- Malware intelligence analysis
- Campaign tracking and attribution
- Intelligence fusion and analysis
- Proactive threat identification using Elasticsearch, Splunk, and LogRhythm
- Anomaly detection with Zeek, Suricata, and Yara rules
- Memory forensics with Volatility
- Host-based hunting with Sysmon and OSQuery
- Network traffic analysis via Wireshark and NetworkMiner
- MITRE ATT&CK-based hunting methodologies
- Advanced search techniques and Google dorking
- Social media intelligence
- Maltego for relationship mapping
- Passive reconnaissance (Shodan, Censys, OSINT Framework)
- HUMINT collection and analysis
- Security incident detection, triage and response
- SIEM management (Splunk, ELK Stack, QRadar)
- Alert correlation and prioritization
- Endpoint detection and response (EDR) with CrowdStrike, SentinelOne
- Root cause analysis
- Incident reporting and documentation
- Vulnerability assessment and management
- Security controls evaluation
- Compliance frameworks (NIST, ISO 27001, CIS)
- Security architecture review
- Threat modeling
- Disk imaging and analysis (FTK, Autopsy)
- Memory forensics (Volatility, Rekall)
- Network forensics
- Timeline analysis
- Incident reconstruction
- Chain of custody maintenance
- Buffer overflow analysis
- Shellcode development
- IDA Pro, Ghidra for static analysis
- Dynamic analysis with x64dbg, GDB
- Firmware analysis
- Exploit development
- OWASP Top 10 vulnerability assessment
- Web penetration testing (Burp Suite, OWASP ZAP)
- Authentication bypass techniques
- API security testing
- Web shell detection
- C
- Python
- Assembly
- Bash scripting
- PowerShell
- Linux (Kali, Ubuntu, CentOS)
- Windows Server
- Cloud environments (AWS, Azure)
- CompTIA Security+ (Udemy)
- CompTIA CySA+ (Letsdefend)
- Google Cybersecurity (Coursera)
- Cyber Threat Intelligence 101 (arcX)
- Practical Ethical Hacking (TCM Security)
- Cyber Threat Intelligence (Udemy)
- Log Analysis using Splunk
- Phishing Email Analysis
- Dark Web Monitoring with OSINT
- Network Traffic Analysis using Wireshark
- Yara Rules for Malware Detection
- Email: prakharvr02@gmail.com
"Security is always excessive until it's not enough." — Robbie Sinclair