I am a Master's graduate student in Cybersecurity with hands-on experience in SOC operations, threat intelligence, applied cryptography, and OT/ICS security. I build and analyze security labs focused on network monitoring, threat investigation, and encryption systems, and I share my work here to demonstrate practical cybersecurity skills. I am currently seeking an opportunities to begin my career as a SOC Analyst where I can contribute to security monitoring, threat detection, and incident investigation.
- SIEM & Threat Detection: Splunk Enterprise, SPL, HTTP Event Collector (HEC), Security Onion, Kibana, Zeek, Suricata, IDS/IPS
- Incident Response & Forensics: Windows Event Log Analysis, Linux Log Analysis, PowerShell Forensics, Packetbeat, IOC Extraction, Attack Timeline Reconstruction
- Threat Intelligence: MITRE ATT&CK (Enterprise + ICS), APT Research, Attack Reconstruction, Threat Reporting
- Network & Endpoint Security: Wireshark, Nmap, Packet Analysis, Firewall Concepts, TCP/IP
- OT / ICS Security: SCADA Systems, Modbus Protocol, LogixPro, Security Onion for OT
- Offensive Tools (Lab Use): Kali Linux, Hydra, GoPhish, Metasploit concepts
- Cryptography: AES, Classical Cipher Analysis, CrypTool 2, OpenSSL
- Cloud & Platforms: AWS (Cloud Practitioner), Ubuntu, Windows 10, VMware
- Splunk HOME SOC Detection Lab - End-to-End Alert Lifecycle - Deployed Splunk Enterprise on Ubuntu as a SIEM, engineered a Windows log forwarding pipeline via HTTP Event Collector (HEC), simulated a multi-stage attack chain from Kali Linux (brute force + PowerShell persistence), detected all attack stages using SPL queries, and documented findings in a formal incident report mapped to MITRE ATT&CK (T1110, T1078, T1059.001, T1547).
- Phishing Simulation & SOC Investigation Lab - Deployed GoPhish on Ubuntu to run a credential harvesting campaign against a Windows victim, captured credentials via a spoofed IT portal, and investigated the full attack chain in Splunk using EventID 4688 parent-child process analysis. Mapped to MITRE ATT&CK T1566.002, T1204.001, T1078, T1056.003.
- Home SOC Lab - Simulated Intrusion & Privilege Escalation Investigation – Simulated intrusion using Kali and Ubuntu to investigate SSH brute-force activity, analyze authentication logs, and detect privilege escalation through sudo misconfiguration.
- Security Onion Lab - Network monitoring and IDS deployment using Zeek and Suricata to analyze network traffic and detect potential attacks.
- PowerShell Lotl Investigaton Lab - Host-based attack investigation focusing on persistence techniques and IOC identification.
- Vulnerable Web Server Traffic Analysis Lab - Malicious traffic investigation using Kibana and Packetbeat with remediation recommendations.
- Sandworm APT Analysis - Research and technical analysis of the Sandworm threat group, including attack reconstruction and MITRE ATT&CK mapping.
- Crown Jewel Security Analysis - Insider threat risk analysis of Tesla intellectual property using the Bowtie risk model to evaluate threats, consequences, and security controls.
- AES Image Encryption Analysis – Implementation and analysis of AES encryption applied to digital images.
- Classical Cryptanalysis Lab – Analysis and decryption of classical ciphers including Caesar, Beaufort, and substitution ciphers.
- SCADA Modbus Attack Detection with Security Onion – Simulation of Modbus packet injection attacks and detection using Security Onion monitoring tools.
- LinkedIn: Durga Ramireddy
- Email: Durga Sai Sri Ramireddy