Praharsh Kumar

3 weeks ago ·

Post by Praharsh
>
Cybersecurity Projects - SOC Analysis, Threat Intelligence & Digital Forensics

Cybersecurity Projects - SOC Analysis, Threat Intelligence & Digital Forensics

Project 1:

Title: Threat Intelligence Enrichment - Splunk Dashboard
Link:

praharshkumar23/
Splunk-SSH-Attack-...
@" SSH Attack Defense Dashboard v2.0 | Splunk

SIEM + Zeek Logs @ Real-time Risk Scoring «
Brute Force Detection...

A ®o wo ¥ 0

Contributor Issues Stars Forks

GitHub - praharshkumar23/Splunk-SSH-Attack-Defense-v2: 🔐 SSH Attack Defense Dashboard v2.0 | Splunk SIEM + Zeek Logs 🚨 Real-time Risk Scoring • Brute Force Detection • Global Attack Heatmap ✅ Enhanced for SOC Analysts | Interactive Drilldowns | Production Ready

🔐 SSH Attack Defense Dashboard v2.0 | Splunk SIEM + Zeek Logs 🚨 Real-time Risk Scoring • Brute Force Detection • Global Attack Heatmap ✅ Enhanced for SOC Analysts | Interactive Drilldowns | Product...

https://github.com/praharshkumar23/Splunk-SSH-Attack-Defense-v2


Description: Built SIEM dashboard for real-time threat analysis using Zeek logs. Detected SSH brute-force attacks with 90%+ accuracy. Reduced triage time by 40%.

Project 2:

Title: SOC Multi-Source Log Correlation Lab
Link:

praharshkumar23/SOC-
Multi-Source-Log-...

This project simulates a real SOC triage scenario
where web attacks, SSH brute force, and firewall
logs are correlated to...

A 1 ©o wo %0

Contributor Issues Stars Forks

GitHub - praharshkumar23/SOC-Multi-Source-Log-Correlation-Lab: This project simulates a real SOC triage scenario where web attacks, SSH brute force, and firewall logs are correlated to identify multi-vector attacks and reduce false positives.

This project simulates a real SOC triage scenario where web attacks, SSH brute force, and firewall logs are correlated to identify multi-vector attacks and reduce false positives. - praharshkumar23...

https://github.com/praharshkumar23/SOC-Multi-Source-Log-Correlation-Lab


Description: 6-VM SOC lab correlating SSH, DNS, and Windows logs. Built Splunk correlation rules detecting lateral movement and DNS tunneling with MITRE ATT&CK mappings.

Project 3:

Title: Windows Digital Forensics Investigation
Link:

praharshkumar23/
Windows-Digital-...
This project focuses on Windows Digital Forensics

and Incident Response (DFIR). The objective is to
analyze Windows forensic artifacts to...

A ®o wo ¥ 0

Contributor Issues Stars Forks

GitHub - praharshkumar23/Windows-Digital-Forensics-Incident-Investigation-Project: This project focuses on Windows Digital Forensics and Incident Response (DFIR). The objective is to analyze Windows forensic artifacts to identify user activity, suspicious behavior, potential compromise, and attacker traces using industry-standard forensic methodology. This project is designed to simulate real-world SOC / DFIR investigations.

This project focuses on Windows Digital Forensics and Incident Response (DFIR). The objective is to analyze Windows forensic artifacts to identify user activity, suspicious behavior, potential comp...

https://github.com/praharshkumar23/Windows-Digital-Forensics-Incident-Investigation-Project


Description: Forensic analysis on compromised Windows system. Analyzed Event Logs, Registry, Prefetch files. Documented persistence mechanisms and attack timeline.

Project 4:

Title: Malware Threat Research
Link:

praharshkumar23/
Malware-analysis-sample

Proficient in malware analysis with strong
understanding of malicious execution lifecycles.
Experienced in identifying infection vectors,
execution triggers, persistence mechanismes,...

A ®o wo ¥ 0

Contributor Issues Stars Forks

GitHub - praharshkumar23/Malware-analysis-sample: Proficient in malware analysis with strong understanding of malicious execution lifecycles. Experienced in identifying infection vectors, execution triggers, persistence mechanisms, payload delivery, and C2 communication. Skilled in behavioral analysis to detect evasion techniques and support effective remediation and mitigation strategies.

Proficient in malware analysis with strong understanding of malicious execution lifecycles. Experienced in identifying infection vectors, execution triggers, persistence mechanisms, payload deliver...

https://github.com/praharshkumar23/Malware-analysis-sample


Description: Analyzed malware samples in sandbox environment. Studied execution lifecycle, persistence, defense evasion, and C2 communication. Extracted IOCs for threat intelligence.

Project 5:

Title: Phishing Investigation & IOC Extraction
Link:

JEQ5o.png

Build software better, together

GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.

https://github.com/praharshkumar23/Phishing-Analysis-Investigation


Description: Analyzed 12+ phishing campaigns. Performed header analysis, URL defanging, attachment analysis, and sender infrastructure investigation using OSINT. Portfolio & Services
Comments

More posts from Praharsh Kumar

View posts
3 weeks ago

Cybersecurity Projects - SOC Analysis, Threat Intelligence & Digital Forensics

Praharsh Kumar · PROJECT 1: · Title: Splunk SIEM Dashboard - SSH Threat Detection · Link: GitHub - praharshkumar23/Splunk-SSH-Attack-Defense-v2: 🔐 SSH Attack Defense Dashboard v2.0 | Splunk SIEM + Zeek Logs 🚨 Real-time Risk Scoring • Brute Force Detection • Global Attack Heatmap ✅ Enhanced for ...

You may be interested in these jobs

  • Work in company

    SOC L3 + Cloud Incident Response

    Coders Brain Technology

    Job Role · SOC L3 + Cloud Incident Response (AWS) · Exp Range · 5-8 Years (Relevant) · Location · Hyderabad preferred (WFO) · Payroll · Permanent with LTI · Availability · Immediate to 30 Days only · Detail JD · Mandatory SkillsMinimum 5 years of experience in Security Operations ...

    Hyderabad

    18 hours ago

  • Work in company

    Senior Cybersecurity Analyst

    Bruker

    +Bruker is enabling scientists to make breakthrough discoveries and develop new applications that improve the quality of human life. As a Senior Cybersecurity Analyst, you will act as a key player in the Global Information Security Team. · +Lead advanced investigations of securit ...

    New Delhi

    3 weeks ago

  • Work in company

    SOC Specialist I

    UST

    We are seeking a highly skilled Senior SOC Analyst to manage our cybersecurity defense capabilities. · This role is responsible for end-to-end threat detection investigation response and mitigation across the enterprise with an additional focus on Dark Web Brand Protection monito ...

    Thiruvananthapuram, Kerala

    1 month ago