Skip to content
View MSreekari's full-sized avatar

Block or report MSreekari

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
MSreekari/README.md

Hi there! 👋

I’m a Computer Science student with a specialization in Cybersecurity and particulary focused on Security Operations (SOC), with hands-on experience in building and analyzing real-world security systems.

My work revolves around threat detection, log analysis, and network monitoring, where I simulate attacks, analyze system behavior, and understand how security teams detect and respond to incidents.

I’m particularly interested in defensive security, including SIEM systems, incident response, and applying security principles to modern systems.


What I Work On

  • Performing SOC-style analysis of cyber incidents using real-world attack scenarios
  • Identifying indicators of compromise (IoCs) through log and behavior analysis
  • Applying SIEM concepts such as log correlation and alert reasoning
  • Analyzing network-level behaviors for potential threats
  • Exploring security architectures based on Zero Trust principles

Tech Stack

  • Security & Tools: Wireshark, Nmap, Kali Linux
  • Languages: Python, Java
  • Concepts: SIEM, Incident Response, Log Analysis, Network Security, ZTA

Currently Learning

  • SIEM and detection engineering
  • Threat hunting and incident response workflows
  • Real-world attack simulation and defense strategies
  • Security standards like GDPR, HIPPA, ISO - 270001

Pinned Loading

  1. secure-data-retrieval-ai-agent-zero-trust-architecture secure-data-retrieval-ai-agent-zero-trust-architecture Public

    ZTA for AI agents implements Zero Trust Architecture, it prevents AI agents from accessing unauthorized data by implementing real-time RBAC, behavioral risk scoring, and dynamic data masking. This …

    Python 1

  2. soc-attack-simulation-and-log-based-incident-analysis soc-attack-simulation-and-log-based-incident-analysis Public

    It demonstrates the simulation and detection of attacks in a controlled lab environment.