Skip to content
View kanikaimerb's full-sized avatar

Block or report kanikaimerb

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
kanikaimerb/README.md

Kanika Im-Erb

Cybersecurity โ€ข GRC โ€ข Security Monitoring

GitHub LinkedIn Email


๐ŸŒธ About Me

Hi, Iโ€™m Kanika โ€” a Thai cybersecurity student currently pursuing B.Tech CSE (Cybersecurity) at the National Forensic Science University in India. Iโ€™m an ICCR Scholar with strong interests in risk management, security monitoring, GRC, and cloud security.

I enjoy building practical tools that protect real people, especially tools that reduce the impact of social engineering scams. Iโ€™m currently exploring SIEM, threat intelligence, detection engineering, cloud security, and incident response.


๐Ÿ› ๏ธ Skills

Languages & Scripting

  • Python, C, SQL, Java, Bash

Security Tools & Frameworks

  • Network Security: Wireshark, Nmap
  • Cloud Security: AWS IAM, Security Groups, CloudTrail, CloudWatch
  • SIEM & Log Analysis: Graylog, Splunk (Basic), Grafana, Datadog, Graylog
  • Threat Modeling: MITRE ATT&CK alignment, event correlation
  • AppSec OWASP Top 10 understanding, API security basics

Platforms

  • Linux, Windows, MacOS

Soft Skills

  • Adaptability, Continuous Learning, Problem-solving, Writing Skills, Project Management

๐Ÿ›ก๏ธ Cybersecurity Domains

Risk Management & Compliance

  • Risk assessments
  • Security auditing
  • Compliance frameworks (NIST, ISO 27001, CIS, PCI DSS)
  • Creating KRIs and risk documentation
  • Policy & Procedure writing
  • Incident reporting lifecycle

Security Monitoring & SIEM

  • Log analysis
  • Event correlation
  • Network traffic analysis
  • Alert creation & tuning

๐ŸŒ Featured Projects

๐Ÿ”Š Vishing Detector (Real-Time Phone Scam Detection)

A tool that analyzes real-time phone call audio and identifies potential vishing (voice phishing) risks using AI. Supports English and Thai. Designed to help users recognize scam calls instantly.


๐Ÿ“Š DIY SIEM & Detection Playground

A hands-on security monitoring environment using Wazuh, Graylog, Grafana, and open-source threat intel tools. Used for log ingestion, rule testing, dashboarding, and understanding SOC operations.
Tech: Wazuh, Graylog, Grafana, Docker


Popular repositories Loading

  1. AI-Based-Voice-Scam-Detector AI-Based-Voice-Scam-Detector Public

    Vishing Detector

    1

  2. Hill-Ciper-Cryptography Hill-Ciper-Cryptography Public

    A C program that implements the Hill Cipher algorithm to encrypt and decrypt text using matrix-based encryption.

    C

  3. Caesar-Cipher-Cryptography Caesar-Cipher-Cryptography Public

    C

  4. Data-Structure Data-Structure Public

    This repository contains implementations of fundamental data structures and algorithms using C programming language. These programs help understand how data is stored, accessed, and manipulated effโ€ฆ

    C

  5. Basic-Web-developement Basic-Web-developement Public

    HTML

  6. lexical-analysis lexical-analysis Public

    A C program that performs lexical analysis by identifying keywords, operators, constants, identifiers, and special symbols in an input string.

    C