Hello, I'm

AKSHAY R

Kerala, India | Open to Relocate

Blue team enthusiast passionate about detecting, analyzing, and defending against cyber threats. I strengthen my skills through SOC monitoring, Wazuh & Splunk labs, and hands-on TryHackMe challenges

Technical Skills

Cyber Security & SOC Skills

  • SOC Monitoring & Alert Investigation (L1)
  • SIEM: Wazuh & Splunk (Log Analysis, Dashboards)
  • Threat Detection & Incident Analysis
  • IDS & Network Security (Suricata)
  • Firewall Monitoring & Log Correlation (UFW)
  • Endpoint & System Log Monitoring (Linux / SSH)
  • Basic Incident Response & Escalation Handling
  • MITRE ATT&CK Framework (Beginner Level)

Work Internship

SOC Analyst intern

CyberSapiens | Oct 2025 – Prsent

• Monitored and analyzed security alerts in a SOC environment, identifying anomalies and escalating potential incidents.
• Supported incident response through log analysis, root-cause investigation, and threat validation.
• Performed vulnerability assessments and web application testing using Burp Suite, Nmap, Wireshark, Postman, and Kali Linux.
• Applied MITRE ATT&CK framework to track adversary techniques and strengthen monitoring and detection.
• Documented incident and vulnerability reports with remediation recommendations and supported compliance audits (ISO 27001, SOC 2, GDPR).

Cyber Security Intern

Eye Q Dot Net Pvt. Ltd | Feb 2025 – May 2025

• Conducted Red Team Assessments to identify vulnerabilities in client systems, enhancing overall security posture.
• Performed web application testing and researched cybersecurity tools to support client projects and improve defenses.
• Developed awareness content and participated in training sessions, promoting a culture of cybersecurity within the organization.
• Ensured timely report submissions while adhering to strict confidentiality and ethical hacking standards.

Key Projects

Detecting Nmap Scans Using Wazuh and Suricata

• Built an Nmap scan detection lab using Wazuh and Suricata.
• Successfully detected scans using Suricata's threat rules and visualized results on the Wazuh dashboard, gaining hands-on experience in threat detection.

Splunk SSH Log Visualizer

• Designed a Splunk dashboard to visualize SSH authentication activity, including successful and failed logins.
• Detected potential brute-force patterns and mapped attacker origins using geolocation visualization.
• Enhanced incident investigation by correlating login events with IP reputation data.

Detecting Successful SSH Bruteforce with Wazuh

• Simulated SSH brute-force attack using Hydra and detected it with Wazuh, identifying multiple authentication failures followed by a successful login.
• Demonstrated Wazuh's threat detection capabilities and highlighted the importance of early detection.

Suricata + Splunk Integration Lab

• Built a lab to detect network scans and suspicious traffic using Suricata IDS and Splunk.
• Correlated Suricata alerts with UFW firewall logs for deeper detection visibility.
• Demonstrated how IDS + firewall + SIEM analysis strengthens detection engineering skills.

ImageCrypt

• A simple Python tool to encrypt and decrypt files, embedding metadata (original filename and extension) directly in the payload.
• It also allows secure key generation with automatic clipboard copy for convenience.

Splunk Cloudflare Log Visualizer

• Built a Splunk dashboard using Cloudflare HTTP request logs to monitor web traffic and server responses.
• Visualized WAF actions and global client IP distribution for security monitoring.
• Gained hands-on experience with SIEM dashboards, log analysis, and security workflows.

Wazuh + Sysmon Integration on Windows

• Integrated Windows 10 as a Wazuh agent and configured Sysmon for advanced endpoint event monitoring.
• Ingested and analyzed endpoint logs in Wazuh SIEM on Kali Linux.
• Improved endpoint visibility and threat detection through log correlation and analysis.

Cowrie Honeypot — Docker Lab

• Deployed Cowrie SSH/Telnet honeypot using Docker to capture attacker-like interactions.
• Collected and analyzed honeypot container logs for behavioral insights.
• Practiced SOC analysis skills and understanding of adversary techniques.

Nmap Network Scanning & Enumeration

• Identified live hosts and discovered open ports through active reconnaissance.
• Detected running services and versions to understand exposed attack surfaces.
• Performed operating system fingerprinting as part of ethical hacking reconnaissance.

Splunk DHCP Log Analyzer

• Analyzed DHCP logs in Splunk SIEM to monitor network and client activity.
• Extracted key fields to detect unauthorized clients and suspicious behavior.
• Visualized IP address assignments and DHCP activity using Splunk searches.

Splunk Apache Log Visualizer

• Analyzed Apache web server logs using Splunk dashboards to monitor web requests.
• Identified response patterns and detected client/server errors (4xx/5xx).
• Visualized web traffic by country to understand access patterns and anomalies.

DNS Log Analysis using Splunk

• Analyzed sample DNS logs to identify anomalies and suspicious activity.
• Investigated top DNS sources and suspicious domains through log analysis.
• Extracted relevant fields using regex to improve search and detection accuracy.

HTTP Log Analysis using Splunk

• Analyzed sample HTTP logs to identify anomalies and unusual behavior.
• Examined web traffic patterns to understand request and response trends.
• Practiced log analysis techniques for security monitoring and investigation.

Linux Digital Forensics Basics

• Acquired a Linux memory dump using AVML for forensic analysis.
• Transferred the memory image to an analysis machine using SCP.
• Practiced live memory acquisition and forensic handling workflows.

Malware Analysis Basics

• Analyzed sample malware (EICAR test file) using VirusTotal and Hybrid Analysis.
• Interpreted scan results, signatures, and behavioral indicators.
• Practiced malware analysis workflows in a safe, controlled environment.

Threat Intelligence Basics

• Analyzed Indicators of Compromise (IOCs) including hashes, IPs, and URLs.
• Identified file types, malware names, maliciousness, and reputation status.
• Assessed IP geolocation and blacklist status to support threat investigation.

Phising analysis using sample .eml file

• Analyzed phishing emails to identify malicious indicators and attack patterns.
• Used tools like VirusTotal, EML Analyzer, MXToolbox (Email Header Analyzer), and AbuseIPDB.
• Investigated headers, URLs, IP reputation, and attachments for threat assessment.

Investigating SSH brute-force using Splunk and sample auth log

• Analyzed authentication (auth) logs in Splunk to detect SSH brute-force activity.
• Identified users with the most failed login attempts and attack patterns.
• Traced source IPs linked to specific users for investigation and correlation.

Linux auth log analysis using Splunk

• Analyzed Linux authentication logs in Splunk to understand login activity.
• Identified total successful authentication events and most common event types.
• Practiced log querying and security monitoring using SIEM workflows.

Zeek log analysis using Splunk

• Analyzed Zeek network logs in Splunk to monitor client and service activity.
• Identified top 10 client IPs and most common network services.
• Created tables based on connection duration for traffic analysis and investigation.

Vulnerability Detection using Wazuh

• Performed vulnerability detection using Wazuh.
• Identified known vulnerabilities from endpoint and system data.
• Practiced SIEM-based vulnerability monitoring workflows.

Detecting nmap scans using Wazuh and Suricata

• Detected Nmap scanning activity using Wazuh and Suricata.
• Analyzed network alerts and logs to identify reconnaissance behavior.
• Practiced intrusion detection and threat monitoring workflows.

Detecting nmap scans and bruteforce attempts using Wazuh and Suricata

• Detected Nmap scanning and SSH brute-force attacks using Wazuh and Suricata.
• Analyzed alerts and correlated events to identify attack patterns.
• Practiced intrusion detection and security monitoring workflows.

Configuration assessment using Wazuh

• Performed configuration assessment using Wazuh.
• Evaluated system security configurations against baseline policies.
• Practiced compliance and posture monitoring workflows.

Detecting successful ssh bruteforce with Wazuh

• Detected successful SSH brute-force attempts using Wazuh.
• Analyzed authentication logs and alerts to confirm compromise indicators.
• Practiced incident detection and SOC investigation workflows.

Detecting file modifications using Wazuh

• Detected file modifications using Wazuh File Integrity Monitoring (FIM).
• Monitored unauthorized changes to critical system files.
• Practiced integrity monitoring and alert analysis workflows.

Cryptix

• Developed Cryptix, a command-line encryption/decryption tool supporting AES, DES, RSA, and Blowfish.
• Implemented text, file, and binary encryption, including key generation.
• Added usability features like clipboard copy and flexible input handling.

Password Cracking Resistance Analyzer

• Built a Node.js password strength checker with real-time analysis.
• Evaluated password complexity and checked exposure against Have I Been Pwned API.
• Improved user security awareness by identifying weak or compromised passwords.

VirusTotal File Analyzer

• Developed a Python-based VirusTotal file analyzer to automate malware checks.
• Implemented SHA-256 hashing, database lookups, conditional uploads, and result retrieval.
• Added retry handling and clean, formatted output for reliable analysis.

Multi-Factor Authentication System

• Developed a Multi-Factor Authentication (MFA) system using Flask, HTML, CSS, and JavaScript.
• Implemented multiple authentication factors to strengthen account security.
• Reduced unauthorized access risk by adding an extra verification layer.

Education

B.Sc. in Cyber Forensics, Data Analytics, and Cyber Security (with IBM)

Yenepoya University | Mangalore, India | Completed May 2025

  • CGPA: 8.4 / 10
  • Class Leader – Technical Peer Support & Team Coordination

Certifications

ETHICAL HACKER

CyberSapiens

Network Security

ISC2

Metasploit for Beginners: Ethical Penetration Testing

Coursera

Ethical Hacking Fundamentals

LearnKartS

Foundations of Cybersecurity

Coursera (Google)

Project Complition Certificate - MFA

Phemesoft

Practical Approach to Cyber Security

TCS iON

Badges

IBM Adv Cert Badge

Cyber Security – Advanced Certificate

IBM

Verify
Malware Analyzer

Malware Analyzer

LetsDefend

Verify
Brute Force

Brute Force

LetsDefend

Verify
SIEM 101

SIEM 101

LetsDefend

Verify
Splunk Engineer

Splunk Engineer

LetsDefend

Verify
Threat Analyst

Threat Analyst

LetsDefend

Verify
VirusTotal

VirusTotal

LetsDefend

Verify
Dynamic Analyst

Dynamic Analyst

LetsDefend

Verify
SOC Member

SOC Member

LetsDefend

Verify
How to Investigate a SIEM Alert?

How to Investigate a SIEM Alert?

LetsDefend

Verify
First Blood

First Blood

LetsDefend

Verify
10 Day Streak

10 Day Streak

LetsDefend

Verify

Get In Touch

Actively seeking challenging roles in a Security Operations Center (SOC) or Incident Response team where I can apply my skills to protect critical infrastructure. Let's connect to discuss how I can be a valuable asset to your organization.