Exploring defensive security, OS-level monitoring, and incident analysis through hands-on projects and structured learning.
Final-year B.E. Computer Science student specializing in Cybersecurity, with a strong interest in SOC operations, security monitoring, and incident response. I enjoy analyzing attacker behavior, working with logs, and building defensive mechanisms at the operating system and network levels.
Python-based security tool to detect unauthorized file creation, modification, and deletion using cryptographic hashing.
Automated reconnaissance tool that performs network scans and summarizes potential attack surfaces.
Lightweight log analysis tool to detect suspicious authentication and access patterns.
A deep-dive into how file integrity monitoring works, why it is critical for system security, and how attackers attempt to bypass it.
An analysis of the attacker lifecycle, mapping reconnaissance, exploitation, and persistence techniques to defensive controls.
Cybersecurity Intern — Larsen & Toubro (L&T)
Assisted in security monitoring, log analysis, and vulnerability assessment activities while gaining exposure to enterprise SOC workflows and tools.