Cybersecurity Engineer & SOC Analyst_
Most cybersecurity grads know the theory. I've actually built and broken AD environments, written Splunk correlation rules that fire in 2.4 seconds, and published the results in IEEE. That's the difference.
High-interaction Active Directory honeypot with Splunk SIEM integration. Decoy users, fake SPNs, bait files β attacker touches any of them, Splunk fires in 2.4s. Zero false positives by design.
Core deception framework with crafted honeyusers as attacker traps. Full behavior logging pipeline using BloodHound + Impacket simulation.
USB HID attack tool β Rubber Ducky alternative using Digispark ATtiny85. Executes PowerShell payloads on insertion for recon, scanning, encryption, and exfiltration.
Low-level recovery tool for deleted Btrfs filesystem structures. Manually parses metadata trees and inode structures β a rare and advanced forensics capability.
Social engineering simulation with realistic fake login pages for red team demos and security awareness training.
Advanced IDS evasion via packet modification β signature bypass and traffic obfuscation research. Conference paper potential.
AI-security intersection: deepfake detection and bypass technique comparison. Future-ready research at the AI + cybersecurity frontier.
Interactive SOC analyst dashboard β real-time alert triage, attack timeline, log visualization. Demonstrates full SOC workflow understanding.
Java GUI-based wireless deauthentication tool for Kali Linux. Simulates 802.11 deauth attacks for wireless security research and testing.
Real data from ShadowNet experiments β not mock data. These charts are generated from actual attack simulation results.
Open to SOC Analyst, Cybersecurity Engineer, and IT Support roles β UAE and India. Graduating April 2026, available immediately.
Alerts are flooding in. You're the analyst. Triage each one β Escalate, Investigate, or Dismiss β before the clock runs out. Wrong calls cost you. Missed alerts cost you more.