Cybersecurity enthusiast | B.Tech (AI-ML) | Top 1% TryHackMe |
I specialize in building enterprise-grade SOC labs, automating threat detection workflows, and applying AI/ML to cyber defense. My journey is fueled by lab-based learning, blue-team engineering, and hands-on simulation of real-world incidents.
To secure a role in Security Engineering or Detection & Response, where I can:
- Engineer and scale SOC pipelines (SIEM, EDR, SOAR)
- Detect, respond, and contain threats in hybrid cloud environments
- Build ML-driven detection models for proactive threat hunting
- Convert threat intel into automated response strategies
- SOC 2 Readiness & Audit Mapping
- CySA+ Exam Preparation
- Threat Emulation in SOC Labs (Elastic, Wazuh, Suricata)
- Python-based SOAR Automation Scripts
Domain | Tools/Platforms |
---|---|
SIEM & Log Analysis | Elastic Stack, Splunk, Wazuh, Sysmon, |
Network & Endpoint Security | Zeek, Suricata, Wireshark, CrowdStrike Falcon |
Threat Intel & Case Handling | TheHive, MISP, osTicket, MITRE ATT&CK |
Exploitation & Forensics | PortSwigger, HTB, TryHackMe, CyberDefenders |
Scripting & Automation | Python, Bash, Shuffle SOAR |
Project | Description |
---|---|
HomeSOC-Lab | Full-stack SOC: SIEM, EDR, ML analytics, alert triage |
SOC Automation Lab | Shuffle + Python for automated enrichment & response |
Honeypot Lab (TPOT) | Multi-sensor deception system capturing live threats |
- Google Professional Cybersecurity
- OPSWAT Endpoint Protection
- CyberDefenders SOC Analyst Tier I (Rank #19 India)
- TryHackMe (220+ day streak, 175+ labs, Jr PenTester)
- SOC 2 Audit & Controls Knowledgebase
- AI/ML for threat behavior detection in SIEM pipelines
- Correlation rule tuning and anomaly detection
- Tier II Analyst skillset development
- Open-source contribution in SOC automation
parveenbirthaliya@gmail.com
GitHub: Parveen-Birthaliya
TryHackMe: K4LK1
CyberDefenders: Bits_Kalki
"Make security proactive, not reactive."