- ๐ญ Currently a Jr. SOC Analyst working on real-world incident detection, automation, and Blue Team challenges
- ๐ฑ Actively learning Microsoft Sentinel, Defender XDR, and deepening proficiency in KQL
- ๐ง Completed the 30 Days MyDFIR SOC Analyst Challenge
- ๐ Built Project CloudDecoy: a cloud-based honeypot lab on Azure and Microsoft Sentinel
- โ๏ธ Keen on automating SOC processes and integrating threat intelligence feeds
- ๐ซ Email: miteshofficial007@gmail.com
- SIEM: Wazuh, Splunk, Elastic Stack (ELK), Microsoft Sentinel
- SOAR: TheHive, Shuffle, Tines
- EDR: Sysmon, Elastic Defend, Windows Defender
- Threat Intel: MISP, VirusTotal, AbuseIPDB, GreyNoise
- Attack Simulation & Research: Mythic C2, DVWA, AD Lab
- Infra & Monitoring: Azure, Ubuntu, Kali, Windows Server, VMware
- Ticketing: osTicket
-
๐ Project CloudDecoy
A honeypot simulation lab on Microsoft Azure and Sentinel, visualizing real-world attacker behavior and intrusion attempts. -
๐ก๏ธ 30 Days MyDFIR SOC Analyst Challenge
A hands-on, guided SOC analyst lab journey using ELK, Sysmon, Microsoft Sentinel, and attacker simulation tooling. -
๐ Microsoft Sentinel: Hands-On Labs
Step-by-step SIEM, detection rule, automation, and dashboard labs in Microsoft Sentinel.
Let's connect and secure the cloud! ๐