Β
Β
Open profile
About me
/**
* Represents me.
*
* @constructor
* @param {string} name - Koyya Naga Durga Prasad.
* @param {string} role - SOC Analyst | Cybersecurity Professional.
* @param {string} location - India.
* @param {string} dailyAlerts - 300+ security alerts monitored in a 24x7 SOC.
* @param {string} specialization - Alert triage, IOC investigation, incident response, phishing analysis.
* @param {string} strengths - Detection logic tuning, log correlation, SLA-driven escalation.
* @param {string} frameworks - MITRE ATT&CK, Cyber Kill Chain, NIST IR Lifecycle.
* @param {string} tools - Splunk ES, Microsoft Defender for Endpoint, Nessus, Wireshark, Nmap, Burp Suite.
* @param {string} interests - Threat hunting, web security, SOC home lab simulations, cyber defense.
*
* @throws {Threat} To suspicious activity.
*
* @returns {Object} SOCAnalyst.
*/
const SOCAnalyst = {
name: "Koyya Naga Durga Prasad",
role: "SOC Analyst | Cybersecurity Professional",
location: "India",
alertsHandled: "300+ daily",
falsePositivesReduced: "30%+",
mindset: "Detect -> Analyze -> Respond -> Improve",
specializations: [
"SIEM Monitoring",
"Alert Triage",
"IOC Investigation",
"Incident Response",
"Threat Detection",
"Phishing Analysis"
],
tools: [
"Splunk Enterprise Security",
"Microsoft Defender for Endpoint",
"Wireshark",
"Nmap",
"Nessus",
"Burp Suite",
"Shodan",
"VirusTotal",
"Jira"
],
frameworks: [
"MITRE ATT&CK",
"Cyber Kill Chain",
"NIST IR Lifecycle"
]
};
! ________________ !
! \ __ / __ !
! \_____()_____/ / ) !
! '============` / / !
! #---\ /---# / / !
! (# @\| |/@ #) / / !
! \ (_) / / / !
! |\ '---` /| / / !
! _______/ \\_____// \____/ o_| !
! / \ / \ / / o_| !
! / | o| / o_| \ !
! / | _____ | / / \ \ !
! / | |===| o| / /\ \ \ !
! | | \@/ | / / \ \ \ !
! | |___________o|__/----) \ \/ !
! | ' || --) \ | !
! |___________________|| --) \ / !
! | o| '''' | \__/ !
! | | | !
! !
! "DON'T CROSS THE DEFENDER..." !
Professional Experience
- SOC Analyst Intern β App Genesis
- Monitored and triaged 300+ daily security alerts using Splunk Enterprise Security.
- Investigated malicious IPs, domains, hashes, and processes using VirusTotal and Shodan.
- Correlated logs across firewalls, endpoints, and Microsoft Defender for Endpoint.
- Reduced false positives by 30%+ through correlation rule tuning and detection refinement.
- Created Jira incident tickets with timelines, evidence, IOCs, and remediation steps.
- Cyber Security Intern β APSSDC
- Performed vulnerability assessments on 20+ assets using Nessus and Nmap.
- Prioritized critical CVEs and contributed to reducing open critical vulnerabilities by 40%.
- Prepared remediation-focused reports with CVSS-based severity analysis.
Projects
- SOC Mini Home Lab β SIEM Monitoring & Attack Simulation
Built a virtual SOC lab with Splunk ES and forwarders, simulated brute-force and scanning attacks, wrote SPL detections for Event ID 4625 anomalies, and created authentication monitoring dashboards.
- Phishing Email Investigation
Performed SMTP header analysis, extracted indicators of compromise, validated malicious artifacts through threat intelligence sources, and documented the attack chain and defensive recommendations.
- PortSwigger Web Security Practice β 80+ Labs
Practiced exploitation of SQL Injection, XSS, IDOR, broken authentication, and access control issues aligned with OWASP Top 10 methodology.
Operations Log
root@SOC:~# initialize --monitoring
[+] Loading Splunk ES...
[+] Connecting to endpoints...
[+] Correlating firewall, endpoint, and authentication logs...
[+] Mapping suspicious behavior to MITRE ATT&CK...
[β] SOC environment active.
root@SOC:~# detect --ioc
[!] Suspicious IP / domain / hash observed...
[β] Validated via OSINT, VirusTotal, and Shodan.
root@SOC:~# respond --incident
[β] Jira ticket created
[β] Timeline documented
[β] Escalated to L2
[β] SLA maintained
root@SOC:~# hunt --phishing
[β] Header analyzed
[β] Indicators extracted
[β] Attack chain documented
root@SOC:~# report --status
[β] Threat contained
[β] Detection logic improved
Quote
βAttackers need one successful attempt. Defenders improve with every alert.β
β Blue Team Mindset
Open profile
About me
/**
* Represents me.
*
* @constructor
* @param {string} name - Koyya Naga Durga Prasad.
* @param {string} role - SOC Analyst | Cybersecurity Professional.
* @param {string} location - India.
* @param {string} dailyAlerts - 300+ security alerts monitored in a 24x7 SOC.
* @param {string} specialization - Alert triage, IOC investigation, incident response, phishing analysis.
* @param {string} strengths - Detection logic tuning, log correlation, SLA-driven escalation.
* @param {string} frameworks - MITRE ATT&CK, Cyber Kill Chain, NIST IR Lifecycle.
* @param {string} tools - Splunk ES, Microsoft Defender for Endpoint, Nessus, Wireshark, Nmap, Burp Suite.
* @param {string} interests - Threat hunting, web security, SOC home lab simulations, cyber defense.
*
* @throws {Threat} To suspicious activity.
*
* @returns {Object} SOCAnalyst.
*/
const SOCAnalyst = {
name: "Koyya Naga Durga Prasad",
role: "SOC Analyst | Cybersecurity Professional",
location: "India",
alertsHandled: "300+ daily",
falsePositivesReduced: "30%+",
mindset: "Detect -> Analyze -> Respond -> Improve",
specializations: [
"SIEM Monitoring",
"Alert Triage",
"IOC Investigation",
"Incident Response",
"Threat Detection",
"Phishing Analysis"
],
tools: [
"Splunk Enterprise Security",
"Microsoft Defender for Endpoint",
"Wireshark",
"Nmap",
"Nessus",
"Burp Suite",
"Shodan",
"VirusTotal",
"Jira"
],
frameworks: [
"MITRE ATT&CK",
"Cyber Kill Chain",
"NIST IR Lifecycle"
]
};! ________________ !
! \ __ / __ !
! \_____()_____/ / ) !
! '============` / / !
! #---\ /---# / / !
! (# @\| |/@ #) / / !
! \ (_) / / / !
! |\ '---` /| / / !
! _______/ \\_____// \____/ o_| !
! / \ / \ / / o_| !
! / | o| / o_| \ !
! / | _____ | / / \ \ !
! / | |===| o| / /\ \ \ !
! | | \@/ | / / \ \ \ !
! | |___________o|__/----) \ \/ !
! | ' || --) \ | !
! |___________________|| --) \ / !
! | o| '''' | \__/ !
! | | | !
! !
! "DON'T CROSS THE DEFENDER..." !Professional Experience
- SOC Analyst Intern β App Genesis
- Monitored and triaged 300+ daily security alerts using Splunk Enterprise Security.
- Investigated malicious IPs, domains, hashes, and processes using VirusTotal and Shodan.
- Correlated logs across firewalls, endpoints, and Microsoft Defender for Endpoint.
- Reduced false positives by 30%+ through correlation rule tuning and detection refinement.
- Created Jira incident tickets with timelines, evidence, IOCs, and remediation steps.
- Cyber Security Intern β APSSDC
- Performed vulnerability assessments on 20+ assets using Nessus and Nmap.
- Prioritized critical CVEs and contributed to reducing open critical vulnerabilities by 40%.
- Prepared remediation-focused reports with CVSS-based severity analysis.
Projects
- SOC Mini Home Lab β SIEM Monitoring & Attack Simulation
Built a virtual SOC lab with Splunk ES and forwarders, simulated brute-force and scanning attacks, wrote SPL detections for Event ID 4625 anomalies, and created authentication monitoring dashboards. - Phishing Email Investigation
Performed SMTP header analysis, extracted indicators of compromise, validated malicious artifacts through threat intelligence sources, and documented the attack chain and defensive recommendations. - PortSwigger Web Security Practice β 80+ Labs
Practiced exploitation of SQL Injection, XSS, IDOR, broken authentication, and access control issues aligned with OWASP Top 10 methodology.
Operations Log
root@SOC:~# initialize --monitoring
[+] Loading Splunk ES...
[+] Connecting to endpoints...
[+] Correlating firewall, endpoint, and authentication logs...
[+] Mapping suspicious behavior to MITRE ATT&CK...
[β] SOC environment active.
root@SOC:~# detect --ioc
[!] Suspicious IP / domain / hash observed...
[β] Validated via OSINT, VirusTotal, and Shodan.
root@SOC:~# respond --incident
[β] Jira ticket created
[β] Timeline documented
[β] Escalated to L2
[β] SLA maintained
root@SOC:~# hunt --phishing
[β] Header analyzed
[β] Indicators extracted
[β] Attack chain documented
root@SOC:~# report --status
[β] Threat contained
[β] Detection logic improvedQuote
βAttackers need one successful attempt. Defenders improve with every alert.β
β Blue Team Mindset
+@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @+
@@ @@
@@ DETECT -> ANALYZE -> RESPOND -> DEFEND @@
@@ @@
@@ 300+ alerts monitored daily @@
@@ 30%+ false positives reduced @@
@@ MITRE ATT&CK aligned investigations @@
@@ Splunk ES driven monitoring @@
@@ Phishing analysis and IOC validation @@
@@ @@
@@ while( monitoring ) { @@
@@ triage_alerts(); @@
@@ investigate_iocs(); @@
@@ tune_detections(); @@
@@ escalate_if_needed(); @@
@@ } @@
@@ @@
@@ "Security is built through discipline and response." @@
@@ @@
+@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @+
+@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @+
@@ @@
@@ DETECT -> ANALYZE -> RESPOND -> DEFEND @@
@@ @@
@@ 300+ alerts monitored daily @@
@@ 30%+ false positives reduced @@
@@ MITRE ATT&CK aligned investigations @@
@@ Splunk ES driven monitoring @@
@@ Phishing analysis and IOC validation @@
@@ @@
@@ while( monitoring ) { @@
@@ triage_alerts(); @@
@@ investigate_iocs(); @@
@@ tune_detections(); @@
@@ escalate_if_needed(); @@
@@ } @@
@@ @@
@@ "Security is built through discipline and response." @@
@@ @@
+@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @+FUN FACT π€ : Cybersecurity is not just about blocking threats β it is about understanding attacker behavior and improving every detection cycle.
Β
ββ π π π π β π β β πΌ πΈ π π π π» πΌ π
ββββββ ππ'π ππππβ«ππππππβͺ ππ ππππ...
Profile mode: ACTIVE DEFENDER
ππ πππ πππππππ ππππ ( C O N G R A T S πππ )
πππππ πππ πππππ:
βββββββ βββββββββββββββββββββββββ ββββββββββββββββ
ββββββββββββββββββββββββββββββββββββββββββββββββββ
βββ βββββββββ βββ ββββββ βββ βββ
βββ βββββββββ βββ ββββββ βββ βββ
ββββββββββββββββ βββ ββββββββββββββββ βββ
βββββββ ββββββββ βββ ββββββββ βββββββ βββ
ββββββ ββββ βββ ββββββ βββ βββ βββββββββββββββββββ
βββββββββββββ ββββββββββββββ ββββ ββββββββββββββββββββ
ββββββββββββββ ββββββββββββββ βββββββ ββββββββββββββ
βββββββββββββββββββββββββββββ βββββ ββββββββββββββ
βββ ββββββ βββββββββ ββββββββββββββ ββββββββββββββββ
βββ ββββββ ββββββββ ββββββββββββββ ββββββββββββββββ
βββββββ βββββββββββββββββββββββ ββββββββββββ ββββββββββ
βββββββββββββββββββββββββββββββββββββββββββββ βββββββββββ
ββββββββββββββ ββββββββββββββββββββββ ββββββ ββββββ βββ
ββββββββββββββ βββββββββββββββ ββββββ βββββββββββββ βββ
βββ ββββββββββββββββββββββ βββββββββββ ββββββββββββββ
βββ ββββββββββββββββββββββ βββββββββββ ββββββββββββ











