Skip to content
View RahulCyberX's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report RahulCyberX

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
RahulCyberX/README.md

Hi, I'm Rahul! 👋

I'm a 22-year-old B.Tech graduate in Computer Science Engineering (CSE), fueled by a passion for cybersecurity. As a fresher, I’m ready to jump into the world of cyber defense, aiming to kickstart my career as a Cybersecurity Analyst. I’m a fast learner who believes that with consistent effort and time, anyone can master anything. My approach? Learn by doing, and I love getting my hands dirty with real-world security challenges!

I’ve built my skills through practical experience, completing over 100 rooms on TryHackMe and earning a spot in the top 2% on the platform. From tackling Capture The Flag (CTF) challenges to diving deep into SIEM, network monitoring, endpoint security, threat intelligence, digital forensics, and incident response, I’m all about solving problems and staying ahead of threats. My GitHub repositories showcase my journey—filled with write-ups and walkthroughs on how I learn and tackle each challenges.

I also share my write-ups and notes through articles on my Medium page, hoping to help fellow cybersecurity enthusiasts navigate their cybersecurity path smoothly.

Skills

Log analysis, Threat detection, Identifying anomalies, Securing networks, Protecting devices and endpoints, Tracking and analyzing cyber threats, Investigating and responding to incidents , Malware analysis, Phishing analysis, Analytical thinking, Attention to detail, and mitigating cyber threats effectively under high pressure environment.

Security Tools

  • SIEM

  • Network Monitoring

  • Endpoint Security

  • Threat Intelligence

  • Digital Forensics

  • Incident Response

  • Operating Systems

Projects (40+ Completed)

# Project Focus Area
1 Static Malware Analysis Using YARA Malware Reverse Engineering
2 Snort IDS Rule Writing and Live Traffic Analysis Network IDS
3 Snort Inline Mode Deployment and Attack Blocking Active Defense
4 Zeek Network Behavior Analysis and Anomaly Detection NSM
5 Threat Hunting with Brim and ZQL on Enterprise PCAPs Threat Hunting
6 Wireshark PCAP Analysis – Full Attack Chain Reconstruction Packet Analysis
7 TShark Command-Line Traffic Analysis and Automation Automation
8 Directory Traversal Detection Using TShark Web Attack Detection
9 Live Windows System Investigation with Sysinternals Suite Live Response
10 Windows Event Log Analysis with PowerShell and wevtutil Log Forensics
... (35 more folders inside this repo) All blue-team domains

https://github.com/RahulCyberX/SOC-Analyst-Portfolio

Certificates

  • Google Cybersecurity Professional Certificate – Sep 2025
  • TryHackMe Cybersecurity 101 - Sep 2025
  • TryHackMe SOC Level 1 Legacy - Nov 2025

Pinned Loading

  1. Cyber-Threat-Intelligence Cyber-Threat-Intelligence Public

    Identifying and using available security knowledge to mitigate and manage potential adversary actions.

  2. Network-Security-and-Traffic-Analysis Network-Security-and-Traffic-Analysis Public

    Hand's on use of Network Security and Traffic Analysis concepts to spot and probe network anomalies using industry tools and techniques.

  3. Endpoint-Security-Monitoring Endpoint-Security-Monitoring Public

    Hands-on practice in monitoring activity on workstations, as that’s where adversaries spend the most time trying to achieve their objectives. Practice done in the simulated challenge/room environme…

  4. Security-Information-Event-Management Security-Information-Event-Management Public

    Hands-on practices in simulated VM environment to understand how SIEM works and get comfortable creating simple and advanced search queries to look for specific answers from the ingested logs.

  5. Digital-Forensics-Incident-Response Digital-Forensics-Incident-Response Public

    Understanding what forensic artifacts are present in the Windows and Linux Operating Systems, how to collect them, and leverage them to investigate security incidents.

  6. Phishing-Analysis Phishing-Analysis Public

    Hands on analysis and defending against phishing emails. Investigating real-world phishing attempts using a variety of techniques.