Welcome to my GitHub portfolio! Iβm a cybersecurity professional specializing in Security Operations (SOC) with hands-on experience in SIEM monitoring, log analysis, threat detection, and incident response. I focus on understanding attacker behavior, identifying suspicious activity, and improving detection workflows across enterprise environments.
Ranked in the Top 1% globally on TryHackMe, I continuously sharpen my skills through real-world labs and practical cybersecurity projects. I publish blogs and write-ups to share knowledge, document learning journeys, and support the cybersecurity community.
-
Role: Cybersecurity Analyst | SOC Analyst
-
Experience: ~1 year of combined hands-on SOC, security operations, and internships
-
Location: Dubai, United Arab Emirates
-
Primary Focus:
- SOC Operations
- SIEM Monitoring (Splunk, Wazuh)
- Threat Detection & Incident Response
- Vulnerability Assessment
- Network & Endpoint Security
-
Email: [email protected]
-
LinkedIn: linkedin.com/in/maharkk
-
Medium (Writeups): medium.com/@maharkk01
B.Tech in Computer Science (Honors), Cybersecurity Major
Lovely Professional University - Punjab, India
Graduated: 2023
CGPA: 7.41 / 10
Red Team Hacker Academy, Kerala, India
Duration: 7 months
- Performed log monitoring, alert triage, and incident investigation across Windows and Linux environments.
- Worked with Splunk, Wazuh, Sysmon, Snort, Wireshark, and other SOC tools to detect and analyze security events.
- Conducted vulnerability assessments and analyzed attacker behavior to understand exploitation chains.
- Investigated simulated incidents, documented findings, and recommended mitigation strategies.
Prodigy InfoTech (Remote)
Duration: 1 month
- Developed cybersecurity mini-projects including encryption tools, network analyzers, keyloggers, and security utilities.
- Gained hands-on experience with encryption techniques, network security, and Python-based security automation.
- Strengthened understanding of cybersecurity fundamentals through practical tool development.
EPAM Systems (Remote / Hybrid)
Duration: 6 months
- Worked with cloud and DevOps technologies including AWS, Docker, Terraform, and GitHub.
- Learned CI/CD workflows, automation practices, and infrastructure-as-code (IaC).
- Gained foundational experience that supports modern cybersecurity and cloud security operations.
- SIEM Monitoring: Splunk, Wazuh
- Log Analysis & Event Correlation
- SOC Workflows: Triage β Investigation β Escalation
- Snort, osquery, Security Telemetry
- Sysmon, YARA, Zeek, Brim
- Building simple hypotheses for targeted hunts
- IOC/TTP-based detection
- Detection β Analysis β Containment β Recovery
- Forensics basics and evidence handling
- Nessus, OpenVAS, WPScan
- Burp Suite, Metasploit, Wireshark, Nmap, NetworkMiner
- Tracking adversary behavior and threat trends
- Mapping CTI to detections
- Malware Analysis (introductory)
- Digital Forensics (beginner)
- Phishing Analysis
- Compliance & System Hardening
- Python - automation, tooling, security scripts
- Bash - Linux scripting
- PowerShell - Windows administration & automation
- JavaScript - basic understanding for web security
- SQL - querying and database security basics
- Windows - administration, IR tasks
- Linux - Kali / Parrot / Ubuntu for security labs and scripting
- Built an image encryption tool using pixel-level operations including XOR and pixel swapping.
- Demonstrates understanding of basic cryptography and secure data manipulation.
- Tools Used: Python, Pillow, NumPy
- GitHub: https://github.com/Maharkk/PRODIGY_CS_02
- Developed a packet sniffer that extracts IPs, protocols, and payload metadata.
- Reinforced skills in network monitoring, packet inspection, and Python scripting.
- Tools Used: Python, Scapy
- GitHub: https://github.com/Maharkk/PRODIGY_CS_05
- Implemented encryption/decryption using the Caesar Cipher algorithm.
- Good demonstration of classical crypto principles and Python logic.
- Tools Used: Python
- GitHub: https://github.com/Maharkk/PRODIGY_CS_01
- Profile: https://tryhackme.com/p/Maharkk
- Rank: Top 1% Globally
- Level: GUARDIAN
- Highlights:
- Completed multiple SOC & security learning paths
- 5+ months streak
- Wide variety of achievement badges
- Certified SOC Analyst (CSA) - EC-Council
- Certified IT Infrastructure & Cyber SOC Analyst (CICSA) - Red Team Hacker Academy
- SOC Level 1 and Level 2 - TryHackMe
- Jr Penetration Tester - TryHackMe
- Ethical Hacking From Scratch - zSecurity / Udemy
- Ranked globally in the top 1%.
- Level: GUARDIAN
- Completed numerous blue-team, web exploitation, and privilege escalation paths
- Completed 5,000+ tasks
- Demonstrated high accuracy, consistency, and analytical thinking
- Reinforced attention to detail - valuable for log analysis & SOC roles
Explore more on my Medium profile:
π https://medium.com/@maharkk01
-
How TryHackMe Transformed My Cybersecurity Journey
Read More -
Exploiting PHP Loose Comparison Vulnerabilities - Magic Hash Attack
Read More -
Exploiting the NAPPING 1.0.1 VulnHub Machine - Full Walkthrough
Read More
Iβm currently focusing on:
- Advanced SOC operations
- Incident response workflows
- Detection engineering
- Cloud security (AWS)
- DevSecOps fundamentals
- Threat Intelligence
- Attacking & defending cloud environments
Iβm open to cybersecurity discussions, SOC-related opportunities, and collaborations.
- LinkedIn: https://www.linkedin.com/in/maharkk/
- Email: [email protected]
- Medium: https://medium.com/@maharkk01
This portfolio is continually updated with new projects, skills, and certifications as I advance in my cybersecurity career.