Chapter 01
The gym taught me one thing.
Discipline isn't motivation.
It is a system.
1.5 years as a certified fitness trainer.Every client taught me something:Consistency > intensity. Every single time.I run my SOC the same way.

Security Engineer / SOC Analyst
I build systems that catch what others miss.
Also, I used to deadlift. The discipline did not leave.
At a glance
Open to roles: Security Analyst / SOC / Detection Engineer | Location: India | Availability: Immediate
Skills keywords: SOC, detection engineering, SIEM, Kafka, ELK, Python, ML, MITRE ATT&CK, log parsing, incident response
Scene 02
Chapter 01
1.5 years as a certified fitness trainer.Every client taught me something:Consistency > intensity. Every single time.I run my SOC the same way.

Chapter 02
Turns out, building a threat detection pipeline and curating a fashion show share the same skill:finding signal in noise.I just moved from runways to Kibana dashboards.
Chapter 03
Lead SOC Architect / TrustLab.1,000,000 logs. Every day.ML detection. Real infrastructure. Real threats.None of them get past the pipeline.

Scene 03
Not just building. Also explaining. To real audiences.

Kibana SOC Dashboard / Live Demo / IIT Bombay

Isolation Forest / Academic Audience
Technical Support / Cybersecurity Competition
Featured: Junior Program Engineer, TrustLab

SOC Architecture Presentation / Live Audience
CO-PRESENTER / RISC 2025 / TRUST SUMMIT / DELOITTE FWD / HSBC CTF
Scene 04
2020

Computer Applications. Where the curiosity started.
2023

Strong fundamentals. Weak sleep schedule.
2023
Cisco Threat Management / Mastercard Cybersecurity / Commonwealth Bank Fraud Detection
Nov 2024

Built production SOC from zero. No template. No vendor.
2024
1M+ logs/day. Apache Kafka + ELK. Real infra.
2025
Chrome extension. Protects secrets on ChatGPT, Claude, Gemini.
2025
Presented ML-based anomaly detection and custom SOC architecture to industry and academic researchers.
2025
Live demo of FOSS SOC Engine with Kibana dashboard to an audience at IIT Bombay.
2025
Officially featured as Junior Program Engineer, TrustLab, in the Deloitte x IIT Bombay FWD program showcase.
2025
Provided technical support for the HSBC Capture the Flag cybersecurity competition.
Scene 05
Deploying a SIEM in production is easy. Doing it at IIT Bombay, from scratch, while catching actual threats, is another thing entirely.
Signed: Someone who actually did it.
ML does not detect threats. Bad ML does not. Good ML, trained on your actual logs, with an Isolation Forest model? That caught 15 attack patterns your signature rules never saw.
You do not need 5 years of experience. You need 1 year of building something real that processes a million logs a day.
Scene 06
Production log parsing engine deployed live at IIT Bombay. Handles 1M+ events/day. 4 hybrid parsing strategies. Dead Letter Queue for forensics. Built a custom Python attack simulation framework to generate real DDoS, SQLi, and brute force traffic to validate every detection rule before production deployment.
Isolation Forest model baked directly into the SIEM pipeline. Catches low-and-slow brute force that signatures miss entirely.
Real-time secret scanner for ChatGPT, Claude, Gemini. Blocks API keys, AWS credentials, JWTs before they reach the model. Shadow DOM isolated. Under 50KB. Zero dependencies.
An open-source practitioner guide for building a full SOC on zero budget. ELK + Wazuh + Suricata + Zeek + TheHive + MISP. Architecture to incident response.
Scene 07
Every log from NGINX, Apache, Postfix goes through a 4-strategy hybrid parser - stateless regex, multi-match, Redis-backed stateful reassembly, JSON mapping. Zero code changes per new log source.
-> Isolation Forest model trained on real IIT Bombay traffic
-> Detects: Low-and-slow brute force, Credential stuffing
-> 15+ attack patterns missed by signatures
-> 30% false positive reduction vs baseline rules
Scene 08
Scene 09
Verified real infrastructure / not a simulation
Deployed at
IIT BombayLogs processed daily
Uptime on SOC infrastructure
False positive reduction
Attack patterns caught by ML
MITRE ATT&CK-aligned rules deployed
"Deployed at IIT Bombay. On real infrastructure. Not a simulation. Not a lab. Production."
Scene 10
1+ year building a live production SOC. Not a home lab. Not a simulation. Real infrastructure. Real threats. Real uptime.
From raw log ingestion to ML-based detection to MITRE-mapped correlation rules. I own the entire pipeline - not just one layer.
FOSS SOC Engine / ML Detection Engine / LLMGuard / SOC Blueprint. All public. All working. All linked.