l4ck4ndR3d

header

LinkedIn TryHackMe Email Location

profile views followers SIH Winner

whoami

$ cat ~/about.txt

Research Intern @ IIT Madras (CyStar Club) β€” building defensive systems at the intersection of SIEM automation, applied ML, and threat intelligence.

I’m a CSE (Cybersecurity) undergrad at Sri Krishna College of Engineering and Technology, Coimbatore (CGPA: 8.69). I spend my time turning security problems into production-grade defenses β€” configuring Wazuh Active Response, engineering anomaly-detection models, and hunting web-app vulnerabilities responsibly. Proud Winner of Smart India Hackathon 2025 (Hardware Edition).


πŸ› οΈ Tech Stack

Languages & Core

SIEM & Detection Engineering

Offensive & Analysis

ML & Cloud


🧠 ML-Based Network Anomaly Detection

Hybrid pipeline combining Isolation Forest (statistical outliers) with LSTM (temporal sequence modeling) for multi-day network log analysis. Integrated with Wazuh for SOC workflow alignment and deployed via Docker with MCP server hooks.

Research Intern Β· IIT Madras (CyStar Club)

πŸ† Rasa Detection ML Model β€” SIH 2025 Winner

Machine learning model for Rasa (taste) detection using electronic tongue (E-Tongue) sensor arrays. Awarded Winner at Smart India Hackathon 2025 (Hardware Edition) β€” national-level recognition for applied ML solving a real-world sensing problem.

Smart India Hackathon 2025 Β· National Winner

πŸ›‘οΈ Mini-SOC Simulation & APT Detection

Localized Security Operations Center lab simulating real-world defensive workflows. Integrated Suricata IDS and Splunk SIEM to ingest network logs and PCAP data for deep packet analysis and APT behavior detection.

View on GitHub β†’

βš™οΈ Automated CVE Monitoring Pipeline

Proactive threat intelligence tool that scrapes real-time vulnerability data from official CVE databases. Python automation filters high-severity updates and delivers instant email alerts via cron-scheduled Docker containers.

View on GitHub β†’

πŸ“Š GitHub Stats

GitHub Stats Top Languages
GitHub Streak

Activity Graph

πŸ’Ό Experience

- role:      Research Intern
  company:   IIT Madras β€” CyStar Club
  period:    Feb 2026 – Present
  stack:     [Wazuh, OpenSearch, RAG, Docker, MCP, Python]
  impact:    "Automated real-time threat mitigation via Wazuh Active Response;
              built ML anomaly detection deployed in Docker with MCP integration."

- role:      Cybersecurity Research Intern
  company:   Lexcyberwall
  period:    May 2024 – Present
  stack:     [Burp Suite, OWASP, VAPT]
  impact:    "Identified & responsibly disclosed multiple IDOR/BOLA vulnerabilities
              and sensitive data exposure on production web applications."

- role:      Security Audit Intern
  company:   Kultivate India Pvt. Ltd.
  period:    May 2025 – Jun 2025
  stack:     [AWS, 3-tier architecture, Security Auditing]
  impact:    "Performed authorized production audits; deployed 3-tier architecture
              on AWS; collaborated with dev teams at internal hackathon."

πŸ† Achievements


πŸ§ͺ Hands-On Labs & Learning

TryHackMe Badge

Continuously sharpening practical skills through TryHackMe rooms covering offensive security, SOC operations, digital forensics, and blue-team workflows. Maintaining a curated library of SOC Playbooks and a Linux DFIR Toolkit reference for incident-response muscle memory.


🀝 Let’s Connect

Open to cybersecurity research opportunities, SOC / Blue Team roles, and ML-driven defense collaborations.


$ echo "Trust is a vulnerability. Verify everything."

⚑ Built with /dev/curiosity · Last updated 2026