SOC Analyst | Threat Hunting | Detection Engineering | Python Automation
πΉ Passionate about detecting, analyzing, and defending against cyber threats.
πΉ Building open-source tools to help others learn and protect networks.
πΉ Focused on continuous learning and sharing community-driven resources.
- π§ Focus: Blue Team operations, threat detection engineering, and security automation
- π§° Skills: Log analysis β’ SIEM (Splunk/ELK) β’ Threat hunting β’ Incident response β’ Linux & network forensics
- π Coding: Python scripting for detection logic, automation pipelines, and enrichment tooling
- βοΈ Cloud Security: Familiar with AWS, Azure, and container security fundamentals
- π± Currently exploring: Detection-as-code, DFIR automation, and adversary emulation with Atomic Red Team
| Project | Description |
|---|---|
| π‘οΈ CyberSentry-Pro | Real-time SOC monitoring for SSH brute-force & suspicious logins |
| π― HoneyWatch | Python honeypot that records intrusion attempts and visualizes attacker behavior |
| π Vulnerability Scanner for Python | Static analyzer to detect insecure patterns (SQLi, eval, secrets) |
| π Cyber Career Map | Interactive map of cybersecurity roles β skills β certs β resources |
Languages: Python β’ C++ β’ JavaScript β’ Java β’ Go
Security: Splunk β’ ELK β’ Wireshark β’ Suricata β’ Linux β’ IDS/IPS
Web: Node.js β’ Express.js β’ Vue.js
Databases: MongoDB β’ MySQL
- π§ Advance into Senior SOC Analyst / Detection Engineer role
- π§ Build and open-source automated threat detection & response tools
- π Earn CompTIA CySA+ or GIAC GCDA / GCIH certification
- π Contribute to CTI sharing / open-threat-intel projects
- βοΈ Deepen skills in Cloud Security (AWS & Azure)
- π§© Continue exploring Malware Analysis, DFIR & Automation pipelines
π§ klithish60@gmail.com
β¨ Thanks for visiting my profile! Check out my projects, drop a β if you like them, and letβs collaborate on something awesome.


