Cybersecurity-focused engineer passionate about threat detection, incident investigation, and defensive security engineering. I build hands-on labs to simulate real-world attacks, develop detection logic, and document structured investigation workflows aligned with SOC and threat intelligence practices.
- Security Monitoring & SIEM (Microsoft Sentinel)
- Threat Hunting & Detection Engineering (KQL)
- IOC Enrichment & Threat Intelligence
- Phishing Investigation & OSINT Analysis
- Windows Security Log Analysis
- MITRE ATT&CK Mapping & Incident Documentation
Brute-force detection (Event ID 4625), GeoIP watchlist enrichment using _GetWatchlist() and ipv4_lookup(), attack visualization via Sentinel Workbooks, and MITRE ATT&CK mapping.
Structured phishing investigation using OSINT techniques, domain intelligence validation, IOC extraction, and defensive mitigation recommendations.
SIEM & Monitoring: Microsoft Sentinel, Log Analytics, Alert Triage Threat Analysis: IOC Enrichment, Watchlists, MITRE ATT&CK Tools: Wireshark, Nmap, Burp Suite, Kali Linux Cloud: Microsoft Azure (VM Deployment, Log Ingestion) Query Language: KQL (Kusto Query Language) Networking: TCP/IP, DNS, Subnetting, OSI Model
- CompTIA Security+
- Google Cybersecurity Professional Certificate
- TryHackMe SOC Level 1 Path
- Cisco CCNA (In Progress)
- Microsoft Cybersecurity Analyst (In Progress)
Seeking entry-level roles in:
- Cybersecurity Analyst
- SOC Analyst
- Threat Hunting
- Detection Engineering
- Security Monitoring & Managed Security Services
I am actively building hands-on projects to strengthen real-world security operations and defensive capabilities.
π Chennai, India π LinkedIn: https://www.linkedin.com/in/ansuman-vadapalli-9526823b0/ π» GitHub: https://github.com/Anshu-soc π§ Email: vadapalliansuman@gmail.com