┌──────────────────────────────────────────────────────────────────┐
│ $ whoami │
│ │
│ > Security Engineering Intern @ CTF7 │
│ > Computer Engineering Student — Nashik, India │
│ > Focus : SecOps · Detection Engineering · AI Security │
│ > Goal : Threat detection and security automation at scale │
└──────────────────────────────────────────────────────────────────┘
Security-focused engineering student with a strong interest in Security Operations, detection engineering, and AI-driven security automation. I build practical tools that simulate real-world attack scenarios and sharpen defensive capabilities.
Currently deepening my foundations in networking, operating systems, log analysis, and attack detection — bridging theory with hands-on implementation.
| Project | Description | Status |
|---|---|---|
| AI-Powered Log Analyzer | FastAPI + regex tool for brute-force detection, anomaly identification, and suspicious IP analysis from system/server logs | 🟢 Active |
| ThreatMorph | GenAI-powered multi-domain threat simulation platform with automated mitigation recommendations | 🟡 In Progress |
| AirPing | Authenticated sound-based devices can operate without Bluetooth or internet connectivity. This is an offline acoustic command channel designed for trusted device recovery. | 🟡 In Progress |
Core
Security & Monitoring
Cloud & Infra
Data & AI/ML
Development
FastAPIPythonRegex/GrokREST APIVercel
A threat detection backend that ingests raw log text and identifies brute-force login attempts, suspicious IPs with frequency ranking, and anomalous behavior patterns. Configurable sensitivity via min_count threshold. Deployable as a serverless API.
Detection coverage: SSH brute-force · HTTP 401/403 floods · Invalid user attempts · Auth failures
GenAILangChainOpenAI APIMulti-DomainLow-Code
A GenAI-powered platform designed to model attacker behavior across multiple domains — web, network, and IoT — and automatically surface mitigation strategies mapped to MITRE ATT&CK techniques. Built for both red team simulation and blue team readiness.
Domains: Web · Network · IoT/Automotive · Cloud
Log Ingestion → Regex / Grok Parsing → Anomaly Detection
↓ ↓
ELK / Splunk MITRE ATT&CK Mapping
↓ ↓
Dashboards & Alerts Sigma / YARA Rule Authoring
↓ ↓
Prometheus + Grafana Incident Triage & Reporting
Security Operations — SOC workflows, detection rule authoring, SIEM
Threat Intelligence — Log triage, IOC analysis, MITRE ATT&CK mapping
AI in Cybersecurity — LLM-assisted detection, anomaly modelling
Automotive Security — CAN bus, ISO/SAE 21434, OTA, infotainment threats
Incident Response — Root cause analysis, forensics, triage
- ELK Stack — building dashboards and writing detection queries
- Sigma rules — portable detection rule authoring
- Docker & Kubernetes — containerizing security tooling
- AWS fundamentals — CloudTrail, GuardDuty, IAM
- MITRE ATT&CK — mapping detections to tactics and techniques
- Windows internals — Event Logs, Sysmon, PowerShell auditing