SOC Analyst Intern
Monitored security alerts, supported threat identification, and documented findings while learning SOC operations end-to-end. The "Thunderbird" tour — sensing storms before they break.
A magizoologist's defense against the dark arts of the wire.
Tracker of digital beasts. Tamer of network traffic. Apprentice keeper of the Magical Security Bureau, trained in SOC operations, threat hunting, and the careful documentation of incidents that go bump in the wire.
Final-year B.E. (Cybersecurity) operator with three SOC/CSOC tours, hands-on tooling across Wireshark, Nmap, Burp Suite and Metasploit, and a working memory of how attackers think. Currently scanning for entry-level opportunities in threat detection and incident response.
I read networks the way Newt reads a creature's footprint — slowly, patiently, never trusting a packet that won't sign its name. By day a final-year student of cybersecurity at Jerusalem College of Engineering; by candlelight a tracker of dark arts in traffic, a sworn keeper of the Magical Security Bureau, and an aspiring SOC analyst seeking the right beast to track next.
Motivated cybersecurity student with hands-on experience in SOC operations, vulnerability assessment, and incident monitoring. Seeking an entry-level cybersecurity role to apply skills in threat detection and strengthen organizational security posture.
Each compartment of my case houses a creature that taught me a discipline. Tap a medallion to see what each beast guards.
Wireshark, Nmap, packet analysis. Investigating anomalies in real-time captures.
Burp Suite, Metasploit, OWASP. Reproducing findings cleanly so they get fixed.
TCP/IP, OSI, firewalls, VPN. Adaptive infrastructure thinking.
SIEM tuning, IDS/IPS monitoring, threat analysis from internship floor.
Jerusalem College of Engineering, Chennai
Jerusalem College of Engineering · 2022–2026 · CGPA 8.1
69.16% · 2022
78.4% · 2020
Monitored security alerts, supported threat identification, and documented findings while learning SOC operations end-to-end. The "Thunderbird" tour — sensing storms before they break.
Assisted with CSOC operations, performed vulnerability documentation, and contributed to internal security audit reports. The patient art of writing it down so the next analyst can read it.
Assisted in cybercrime documentation, digital evidence organization, and exposure to incident investigation workflows — case-files moving from victim report to court-ready evidence.
FST Information Technology Pvt Ltd (FUJISOFT) · Perungudi
Monitored security alerts, supported threat identification, and documented findings while learning SOC operations end-to-end.
Fortifying Digital Security · T. Nagar, Chennai
Assisted with CSOC operations, performed vulnerability documentation, and contributed to internal security audit reports.
E1 Police Station · Mylapore
Assisted in cybercrime documentation, digital evidence organization, and exposure to incident investigation workflows.
Two grimoires kept in the case: one for tracking, one for trapping. The Pensieve pours their captures into running ink.
# scapy filter loop — protocol monitor def watch(pkt): if pkt.haslayer(IP): if pkt[IP].ttl < 32: flag(pkt, "low-ttl spoof?")
Python pipeline built on Scapy that captures, classifies, and watches over real-time network traffic. Filters by protocol, flags anomalies, and writes a clean field-note for every encounter.
A honeypot-based system that analyzes cyberattacks, traces spoofed IPs, and generates attacker attribution insights. Bait set, beast caught, ledger updated.
Network Traffic Analysis Tool
A Python-based packet capture tool built on Scapy. Monitors, filters, and analyzes real-time network traffic.
Honeypot-Assisted IP Traceback System
A honeypot-based system that analyzes cyberattacks, traces spoofed IPs, and generates attacker attribution insights.
Each compartment of the case is a Folio of this codex. Tap any glowing pin to apparate.
A barn owl departs the Owlery the moment your seal closes. Replies typically return within two moons — sooner, if you tip Hedwig.
Few apprentices think to whisper alohomora. Of those who do, fewer still notice the hint at the corner of the screen. The compartment opens only when called by name — welcome, and well done.
[ achievement unlocked: curious_apprentice ]
The Magizoologist also dabbles in: CTF puzzles · Home-lab honeypots · Reading SANS write-ups by candlelight.