Available for opportunities · Coimbatore, IN

Cybersecurity Researcher, SOC & Threat Detection Engineer.

I build intelligent defenses — SIEM automation, ML-driven anomaly detection, and threat intelligence pipelines that detect, respond, and adapt in real time.

~/mahendar — zsh
$ whoami
bala_mahendar_m
$ cat role.txt
Research Intern @ IIT Madras (CyStar)
# SIEM · ML · Threat Intel · VAPT
$

About Me

I'm a Computer Science and Engineering (Cybersecurity) undergraduate at Sri Krishna College of Engineering and Technology, Coimbatore, maintaining a CGPA of 8.69. Currently a Research Intern at IIT Madras (CyStar Club), where I work on SIEM automation, ML-based anomaly detection, and RAG-powered security tooling.

My focus lies at the intersection of Security Operations, Threat Intelligence, and Applied Machine Learning — designing systems that automate detection and response at scale. I have hands-on experience with Wazuh, Splunk, Suricata, and Elastic SIEM, and have responsibly disclosed multiple high-impact web application vulnerabilities including IDOR/BOLA flaws. Proud Winner of Smart India Hackathon 2025.

// Tech Stack

  • Python
  • Wazuh
  • Splunk
  • Elastic SIEM
  • Suricata
  • Wireshark
  • Burp Suite
  • Volatility
  • Docker
  • Linux
  • Incident Response
  • Threat Intel
  • SOC Automation
  • VAPT
  • LSTM
  • Isolation Forest
  • RAG / OpenSearch
  • MCP Server

Experience

Research Intern

IIT Madras — CyStar Club · Feb 2026 – Present

Configured Wazuh Active Response modules to automate real-time threat mitigation and containment. Developed OpenSearch DSL queries powered by a RAG pipeline, and built ML-based anomaly detection models deployed via Docker with MCP server integration.

Cybersecurity Research Intern

Lexcyberwall · May 2024 – Present

Identified and responsibly reported multiple high-impact web application vulnerabilities including Broken Object Level Authorization (IDOR/BOLA) and sensitive data exposure. Conducted secure proof-of-concept validation using response-based analysis on unauthenticated endpoints.

Security Audit Intern

Kultivate India Pvt. Ltd. · May 2025 – Jun 2025

Performed authorized security audits on production-facing company assets. Gained hands-on experience deploying 3-tier architecture on AWS and collaborated with developer teams during an internal hackathon to deliver secure-by-design solutions.

Notable Projects

ML-Based Network Anomaly Detection

Hybrid anomaly detection pipeline combining Isolation Forest (statistical outliers) with LSTM (temporal sequence modeling) to improve detection accuracy on multi-day network log data. Integrated with Wazuh for SOC workflow alignment.

LSTM Isolation Forest Wazuh Python

Rasa Detection ML Model ★ SIH Winner

Machine learning model for Rasa (taste) detection using electronic tongue (E-Tongue) sensor arrays. Awarded Winner at Smart India Hackathon 2025 for solving a real-world problem with applied ML.

Machine Learning Python Sensor Data

Mini-SOC Simulation & APT Detection

Localized Security Operations Center lab simulating real-world defensive workflows. Integrated Suricata IDS and Splunk SIEM to ingest network logs and PCAP data for deep packet analysis and APT behavior detection.

Splunk Suricata Wireshark Zeek
View Project →

Automated CVE Monitoring Pipeline

Proactive threat intelligence tool that scrapes real-time vulnerability data from official CVE databases. Python automation filters high-severity updates and delivers instant email alerts to security teams via cron-scheduled containers.

Python Docker Linux Cron GitHub
View Project →

Achievements & Recognition

Hackathons & CTF Competitions

  • Smart India Hackathon 2025 — Winner: National-level recognition for developing an ML model for Rasa detection using E-Tongue sensor data.
  • Thiran CTF — 11th Place: Capture The Flag competition at Sri Eshwar College of Engineering, Coimbatore.
  • Responsible Disclosure: Multiple high-impact web application vulnerabilities (IDOR/BOLA, data exposure) reported via Lexcyberwall.

Education

  • B.E. Computer Science & Engineering (Cybersecurity)
  • CGPA: 8.69  |  Sept 2023 – April 2027

Core Competencies

  • SIEM Engineering (Wazuh, Splunk, Elastic)
  • Intrusion Detection & Analysis (Suricata, Zeek)
  • Incident Response & SOC Automation
  • Threat Intelligence & CVE Monitoring
  • Web Application Penetration Testing (VAPT)
  • Machine Learning for Security (LSTM, Isolation Forest)
  • RAG & OpenSearch DSL Development
  • Docker & MCP Server Integration
  • Memory Forensics (Volatility)
  • Network Traffic Analysis (Wireshark, PCAP)

CTF & Hands-On Labs Writeups

TryHackMe — Mr.Bulloid

Active hands-on learner on TryHackMe, completing rooms across offensive security, SOC operations, digital forensics, and network defense. Continuously sharpening practical skills in a live lab environment to complement academic and research work.

Defensive Security SOC Labs Digital Forensics Blue Team
View TryHackMe Profile →

Medium Writeups

Active writeup writer on Medium, sharing knowledge to others by the way of understanding by myself. My writeups are related to Cybersecurity & AI.

View Medium Profile →

Let's Connect

Open to cybersecurity research opportunities, SOC/Blue Team roles, and collaborations on offensive security or ML-driven defense projects.

mahendarmbala2001@gmail.com

+91 97874 34247