Skip to content
View Maharkk's full-sized avatar
  • Red Team Hacker Academy
  • Kerala, India
  • LinkedIn in/maharkk

Block or report Maharkk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Maharkk/README.md

πŸ‘¨β€πŸ’» Mahar Hassain K K - Cybersecurity / SOC Analyst

Welcome to my GitHub portfolio! I’m a cybersecurity professional specializing in Security Operations (SOC) with hands-on experience in SIEM monitoring, log analysis, threat detection, and incident response. I focus on understanding attacker behavior, identifying suspicious activity, and improving detection workflows across enterprise environments.

Ranked in the Top 1% globally on TryHackMe, I continuously sharpen my skills through real-world labs and practical cybersecurity projects. I publish blogs and write-ups to share knowledge, document learning journeys, and support the cybersecurity community.


πŸ” About Me

  • Role: Cybersecurity Analyst | SOC Analyst

  • Experience: ~1 year of combined hands-on SOC, security operations, and internships

  • Location: Dubai, United Arab Emirates

  • Primary Focus:

    • SOC Operations
    • SIEM Monitoring (Splunk, Wazuh)
    • Threat Detection & Incident Response
    • Vulnerability Assessment
    • Network & Endpoint Security
  • Email: [email protected]

  • LinkedIn: linkedin.com/in/maharkk

  • Medium (Writeups): medium.com/@maharkk01


πŸŽ“ Education

B.Tech in Computer Science (Honors), Cybersecurity Major
Lovely Professional University - Punjab, India
Graduated: 2023
CGPA: 7.41 / 10


πŸ’Ό Experience

Cybersecurity Trainee - SOC Analyst

Red Team Hacker Academy, Kerala, India
Duration: 7 months

  • Performed log monitoring, alert triage, and incident investigation across Windows and Linux environments.
  • Worked with Splunk, Wazuh, Sysmon, Snort, Wireshark, and other SOC tools to detect and analyze security events.
  • Conducted vulnerability assessments and analyzed attacker behavior to understand exploitation chains.
  • Investigated simulated incidents, documented findings, and recommended mitigation strategies.

Cybersecurity Intern

Prodigy InfoTech (Remote)
Duration: 1 month

  • Developed cybersecurity mini-projects including encryption tools, network analyzers, keyloggers, and security utilities.
  • Gained hands-on experience with encryption techniques, network security, and Python-based security automation.
  • Strengthened understanding of cybersecurity fundamentals through practical tool development.

Cloud & DevOps Intern

EPAM Systems (Remote / Hybrid)
Duration: 6 months

  • Worked with cloud and DevOps technologies including AWS, Docker, Terraform, and GitHub.
  • Learned CI/CD workflows, automation practices, and infrastructure-as-code (IaC).
  • Gained foundational experience that supports modern cybersecurity and cloud security operations.

πŸ› οΈ Skills

πŸ”Ή Security Operations (SOC)

  • SIEM Monitoring: Splunk, Wazuh
  • Log Analysis & Event Correlation
  • SOC Workflows: Triage β†’ Investigation β†’ Escalation
  • Snort, osquery, Security Telemetry

πŸ”Ή Threat Hunting & Detection

  • Sysmon, YARA, Zeek, Brim
  • Building simple hypotheses for targeted hunts
  • IOC/TTP-based detection

πŸ”Ή Incident Response

  • Detection β†’ Analysis β†’ Containment β†’ Recovery
  • Forensics basics and evidence handling

πŸ”Ή Vulnerability Assessment & Pentesting

  • Nessus, OpenVAS, WPScan
  • Burp Suite, Metasploit, Wireshark, Nmap, NetworkMiner

πŸ”Ή Cyber Threat Intelligence

  • Tracking adversary behavior and threat trends
  • Mapping CTI to detections

πŸ”Ή Additional Security Skills

  • Malware Analysis (introductory)
  • Digital Forensics (beginner)
  • Phishing Analysis
  • Compliance & System Hardening

πŸ’» Programming & Scripting

  • Python - automation, tooling, security scripts
  • Bash - Linux scripting
  • PowerShell - Windows administration & automation
  • JavaScript - basic understanding for web security
  • SQL - querying and database security basics

πŸ–₯️ Operating Systems

  • Windows - administration, IR tasks
  • Linux - Kali / Parrot / Ubuntu for security labs and scripting

πŸ—‚οΈ Projects

1. Pixel Manipulation for Image Encryption

  • Built an image encryption tool using pixel-level operations including XOR and pixel swapping.
  • Demonstrates understanding of basic cryptography and secure data manipulation.
  • Tools Used: Python, Pillow, NumPy
  • GitHub: https://github.com/Maharkk/PRODIGY_CS_02

2. Network Packet Analyzer

  • Developed a packet sniffer that extracts IPs, protocols, and payload metadata.
  • Reinforced skills in network monitoring, packet inspection, and Python scripting.
  • Tools Used: Python, Scapy
  • GitHub: https://github.com/Maharkk/PRODIGY_CS_05

3. Caesar Cipher (Classical Cryptography)

  • Implemented encryption/decryption using the Caesar Cipher algorithm.
  • Good demonstration of classical crypto principles and Python logic.
  • Tools Used: Python
  • GitHub: https://github.com/Maharkk/PRODIGY_CS_01

πŸ† TryHackMe

  • Profile: https://tryhackme.com/p/Maharkk
  • Rank: Top 1% Globally
  • Level: GUARDIAN
  • Highlights:
    • Completed multiple SOC & security learning paths
    • 5+ months streak
    • Wide variety of achievement badges

πŸŽ“ Certifications

  • Certified SOC Analyst (CSA) - EC-Council
  • Certified IT Infrastructure & Cyber SOC Analyst (CICSA) - Red Team Hacker Academy
  • SOC Level 1 and Level 2 - TryHackMe
  • Jr Penetration Tester - TryHackMe
  • Ethical Hacking From Scratch - zSecurity / Udemy

πŸ… Achievements

Top 1% on TryHackMe

  • Ranked globally in the top 1%.
  • Level: GUARDIAN
  • Completed numerous blue-team, web exploitation, and privilege escalation paths

UHRS (Universal Human Relevance System)

  • Completed 5,000+ tasks
  • Demonstrated high accuracy, consistency, and analytical thinking
  • Reinforced attention to detail - valuable for log analysis & SOC roles

πŸ“œ Blogs & Write-Ups

Explore more on my Medium profile:
πŸ“Ž https://medium.com/@maharkk01

Featured Articles

  • How TryHackMe Transformed My Cybersecurity Journey
    Read More

  • Exploiting PHP Loose Comparison Vulnerabilities - Magic Hash Attack
    Read More

  • Exploiting the NAPPING 1.0.1 VulnHub Machine - Full Walkthrough
    Read More


🌱 Learning & Development

I’m currently focusing on:

  • Advanced SOC operations
  • Incident response workflows
  • Detection engineering
  • Cloud security (AWS)
  • DevSecOps fundamentals
  • Threat Intelligence
  • Attacking & defending cloud environments

🀝 Let's Connect

I’m open to cybersecurity discussions, SOC-related opportunities, and collaborations.


This portfolio is continually updated with new projects, skills, and certifications as I advance in my cybersecurity career.

Pinned Loading

  1. PRODIGY_CS_02 PRODIGY_CS_02 Public

    A simple image encryption tool using XOR-based pixel manipulation. Encrypt and decrypt PNG images with a user-specified key to secure image content. The tool avoids JPEG compression issues and ensu…

    Python 1

  2. PRODIGY_CS_01 PRODIGY_CS_01 Public

    Python implementation of Caesar Cipher for encryption and decryption tasks.

    Python 1

  3. PRODIGY_CS_05 PRODIGY_CS_05 Public

    A simple Python-based packet sniffer tool using Scapy for educational purposes. It captures and analyzes network packets, displaying key information like IP addresses, protocols, and payloads. Desi…

    Python

  4. PRODIGY_CS_03 PRODIGY_CS_03 Public

    A simple Password Complexity Checker tool that assesses the strength of passwords based on length, uppercase and lowercase letters, numbers, and special characters. Provides feedback on whether a p…

    Python

  5. PRODIGY_CS_04 PRODIGY_CS_04 Public

    A simple ethical keylogger built in Python, designed for educational purposes. It logs keystrokes with timestamps and saves them to a file. The keylogger includes user consent prompts and is time-l…

    Python