INITIALIZING SYSTEMS...
⚡ SOC STATUS
THREATMEDIUM
ALERTS0
MTTR8.49m
STATUSACTIVE
--:--:--
ram@3cho-terminal ~
ram@3cho:~$
⚡ Threat Analyst · SOC

Ram M

|

Building intelligent security systems that defend at scale. Specializing in threat detection, SIEM engineering, and AI-powered automation — turning alerts into actionable intelligence.

50+ Alerts/Day Triaged
32% MTTR Reduction
10+ Security Tools
Ram M
SOC Analyst · Active
🛡 Hyderabad, IN
01

Core Competencies

☁️
Cloud Security
Microsoft Azure · Azure Sentinel · IAM/RBAC · CSPM · Cloud Policies
🔍
Security Operations
Incident Response · Alert Triage · Threat Hunting · IOC/IOA Analysis · Malware Analysis
📊
SIEM Engineering
AlienVault USM · Azure Sentinel · Rule Tuning · Detection Design · False Positive Reduction
🌐
Application Security
OWASP Top 10 · SAST/DAST · Secure SDLC · Web Pentesting · Burp Suite
🤖
Security Automation
n8n Workflows · AI Integration · Playbook Development · API Orchestration
🔒
Vulnerability Mgmt
Nessus · OpenVAS · CVSS Risk Prioritization · Remediation Tracking
⚙️
DevSecOps
Shift-Left Security · SonarQube · Jenkins · CI/CD Security · Static Analysis
🛡️
Endpoint Security
CrowdStrike Falcon XDR · Microsoft Defender XDR · SentinelOne XDR · Cybereason EDR
02

Experience

Cyber Security Analyst
CyberNexGen Solutions · Bangalore (Remote)
Aug 2024 — Present
Triaged and investigated 50+ security alerts per day using AlienVault USM and Azure Sentinel, maintaining consistent SLAs
Validated and escalated 3+ confirmed incidents daily to IR teams with full investigation documentation
Designed and tuned SIEM detection rules, achieving significant reduction in false positives and enhanced threat visibility
Performed threat hunting using IOC/IOA analysis and anomaly-based detection methodologies
Supported Azure cloud log monitoring and security investigations across enterprise environments
Developed and maintained SOC playbooks, SOPs, and incident response documentation
Assisted in endpoint security monitoring using CrowdStrike Falcon and Microsoft Defender XDR
Reduced MTTR from 12.45 minutes to 8.49 minutes through SIEM automation and playbook improvements
03

Projects

🛡️
Production-Grade
Phish Guard AI — Email Phishing Detection
Built a production AI-powered phishing analysis automation pipeline using a dual-workflow architecture. Ingests emails, extracts IOCs, enriches with threat intel, and generates automated reports — all without manual intervention.
KEY FEATURES
SPF/DKIM/DMARC validation + header analysis
VirusTotal, AbuseIPDB, URLScan, Hybrid Analysis enrichment
OpenAI/Gemini AI-based triage & risk classification
Telegram bot alerts, Google Sheets logging, Gmail reporting
n8n OpenAI VirusTotal AbuseIPDB Gemini AI JavaScript
🔬
SAST Implementation
SonarQube — Static Application Security Testing
End-to-end SAST deployment supporting shift-left security practices. Configured scanning pipelines, identified vulnerabilities in production PHP CRM application, and generated actionable remediation reports.
Installed & configured SonarQube + SonarScanner CLI on Windows Server
PHP CRM SAST on IIS: security hotspots, bugs, code smells identified
Maintainability, reliability & security metrics analysis
Integrated static analysis into development lifecycle (CI/CD)
SonarQube Jenkins CI/CD PHP IIS DevSecOps
04

Tool Arsenal

SIEM & Cloud
AlienVault USM Azure Sentinel Microsoft Azure IAM/RBAC
EDR & XDR
CrowdStrike Falcon Microsoft Defender SentinelOne XDR Cybereason EDR
Threat Intelligence & OT/IoMT
Cyberint Medigate Armis VirusTotal AbuseIPDB
Security Testing & Automation
Burp Suite Nessus OpenVAS n8n SonarQube OpsGenie
05

Certifications

🌐
Application & Web Application Security
IIIT-Bangalore
🔍
Vulnerability Assessment & Penetration Testing
IIIT-Bangalore
🦠
Ransomware & Malware Analysis
IIIT-Bangalore
🏢
Enterprise Infrastructure Security
IIIT-Bangalore
🔐
Certified Network Security Practitioner (CNSP)
The SecOps Group
🎓
Advanced Executive Program in Cybersecurity
IIIT-Bangalore · Simplilearn
⚔️
Certified Ethical Hacker (CEH V13)
EC-Council
In Progress
🏅
Blue Team Level 1 (BTL1)
Security Blue Team
In Progress
06

Achievements

32%
MTTR Reduction — Reduced mean time to respond from 12.45 to 8.49 minutes through SIEM automation and playbook optimization
50+
Daily Alert Coverage — Consistently triaged and investigated 50+ security alerts per day with high accuracy across multiple platforms
False Positive Reduction — Designed and tuned SIEM detection rules improving threat visibility and reducing analyst noise
🤖
AI Automation Pioneer — Built production-grade AI phishing detection pipeline before starting current role, combining n8n, OpenAI, and 5 threat intel APIs
07

Journey

Aug 2024 — Present
Cyber Security Analyst
CyberNexGen Solutions · Bangalore (Remote)
Jan 2024 — Jun 2024
Advanced Executive Program — Cybersecurity
IIIT-Bangalore · Simplilearn
2023 — Pre-employment
Built AI Phishing Detection Pipeline
n8n · OpenAI · VirusTotal · AbuseIPDB · Gemini AI
2022 — 2024
Bachelor of Science — Computer Science
Andhra University · CGPA 7.3
In Progress
CEH V13 · BTL1
EC-Council · Security Blue Team

Let's Connect
& Build Together

Open to Threat Analysis, Security Automation, and Threat Intelligence roles. Let's discuss how I can help strengthen your security posture.

🔐 Caesar Cipher Decoder
Cryptography Level: Easy

A threat actor left an encoded message in a phishing email. Decode the Caesar cipher to uncover the hidden command. Shift value: unknown — you must brute-force it.

Score: 0 Round: 1/5
❤️❤️❤️
Loading...

Tip: Try each shift 1-25 mentally, or look for common words like THE, AND, IS

01 Binary Message Decoder
Binary / Encoding Level: Medium

Malware embedded a binary-encoded payload in a log file. Each 8-bit group is an ASCII character. Decode the full message before the timer runs out!

Score: 0 60s Round: 1/4

Each group of 8 bits = 1 ASCII character. 01000001 = A (65)

🔑 Hash Cracker Challenge
Hash Analysis Level: Hard

You captured a password hash from a compromised endpoint. Crack it using the provided wordlist — identify which common password matches the MD5 hash.

Score: 0 Round: 1/5
❤️❤️❤️

MD5 Hash to crack:

Loading...

Wordlist (click to test):

MD5 is a one-way hash — you must try each word from the wordlist and see which one matches.

📡 Packet Sniffer — Find the Threat
Network Analysis Level: Medium

You're analyzing a PCAP dump. Find all suspicious packets — look for C2 beaconing, port scans, exfiltration, or known malicious IPs. Click each suspicious row to flag it.

Score: 0 Found: 0/0 False flags: 0
#SRC IPDST IPPORTPROTOSIZEFLAG

Look for: repeated connections to same IP (beaconing), unusual ports (4444, 1337, 31337), private→public large transfers, known C2 IPs (185.x.x.x ranges)

🛡️ Firewall Rule Builder
Firewall / Policy Level: Expert

You are the firewall. Classify each network rule as ALLOW or DENY based on security best practices. Get all rules correct to protect the network!

Score: 0 Correct: 0
❤️❤️❤️

Click ALLOW ✅ or DENY ❌ for each rule:

Deny: telnet(23), FTP(21), RDP(3389) from internet, any port 0. Allow: HTTPS(443), SSH from trusted IPs, DNS(53) outbound.