Skip to content
View prakharvr02's full-sized avatar
  • New Delhi

Block or report prakharvr02

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
prakharvr02/README.md

🔐 Prakhar Verma | Security Operations Analyst | Threat Intelligence Specialist


🛡️ Professional Summary

Security Operations Analyst specializing in defensive cybersecurity:

  • Threat Detection: Developed 150+ Sigma rules covering MITRE ATT&CK framework
  • Incident Response: Managed security incidents from detection to containment
  • Malware Analysis: Conducted static/dynamic analysis of Windows/Linux malware
  • SOC Optimization: Implemented alert tuning to reduce false positives
  • Threat Intelligence: Built automated feeds with MISP and OTX integration

"Transforming security data into actionable intelligence through precision detection engineering and threat-informed defense strategies."


🔍 Core Projects

🚨 Threat Detection Framework

GitHub

  • Tools: Splunk, Sigma, Sysmon
  • Highlights:
    • Created detection rules for 85% of MITRE ATT&CK techniques
    • Implemented automated IOC enrichment workflows
    • Developed documentation for SOC analysts

🕵️‍♂️ Malware Analysis Lab

GitHub

  • Tools: REMnux, YARA, CAPE
  • Highlights:
    • Built automated analysis pipeline
    • Developed detection signatures for common malware families
    • Documented analysis methodologies

📊 SOC Automation

GitHub

  • Tools: Splunk, Python
  • Highlights:
    • Created alert triage playbooks
    • Developed reporting dashboards
    • Automated routine investigation tasks

🛠️ Technical Skills

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
Security Monitoring:  Splunk ES | Microsoft Sentinel | ELK Stack
Endpoint Security:    CrowdStrike | Microsoft Defender ATP | Tanium
Forensics Tools:      Velociraptor | FTK | Autopsy
Malware Analysis:     IDA Pro | Ghidra | Cuckoo Sandbox
Scripting:           Python | PowerShell | Bash
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

Popular repositories Loading

  1. SOC-Automation SOC-Automation Public

    Built a complete SIEM + DFIR homelab using Wazuh, TheHive, Cortex, Arkime & MISP. Setup guide on GitHub.

    1

  2. Static-Malware-Analysis-Homelab Static-Malware-Analysis-Homelab Public

    Performed deep static analysis using tools like HxD, Cmder, HashCalc, BinText, XorSearch, FLOSS, UPX, and PEStudio to extract strings, identify file structure, detect obfuscation, and reveal indica…

  3. Dynamic-Malware-Analysis-Homelab Dynamic-Malware-Analysis-Homelab Public

    Dynamic malware analysis homelab setup using virtualization, monitoring, and debugging tools to observe and understand malware behavior safely.

  4. Phishing-Analysis Phishing-Analysis Public

    Analyzed a real phishing email using Thunderbird, Sublime Text, and CyberChef. Investigated headers, decoded base64, extracted URLs, and identified impersonation to build practical SOC-level phishi…

  5. Splunk-Cyberdefender-Project Splunk-Cyberdefender-Project Public

    Splunk BOTSv3 lab visual reference for SOC analysts and learners. Useful for understanding real-world threat detection using SIEM. Enhance your investigation skills with real attack data.

  6. PCAP-Analyzing-Lab-Blue-Team-Project PCAP-Analyzing-Lab-Blue-Team-Project Public

    A complete PCAP analysis lab project for blue teamers to detect, investigate, and document network threats using real-world attack scenarios.