Skip to content
View DurgaPrasasd264's full-sized avatar

Block or report DurgaPrasasd264

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
DurgaPrasasd264/README.md

Hi there πŸ‘‹

Typing SVG

Β 

Β 


π“Ÿ 𝓑 π“ž 𝓕 π“˜ 𝓛 𝓔 π“œ 𝓔 𝓣 𝓑 π“˜ 𝓒 𝓒


Top of pokeball

Open profile
profile image
About me
/**
 * Represents me.
 *
 * @constructor
 * @param {string} name - Koyya Naga Durga Prasad.
 * @param {string} role - SOC Analyst | Cybersecurity Professional.
 * @param {string} location - India.
 * @param {string} dailyAlerts - 300+ security alerts monitored in a 24x7 SOC.
 * @param {string} specialization - Alert triage, IOC investigation, incident response, phishing analysis.
 * @param {string} strengths - Detection logic tuning, log correlation, SLA-driven escalation.
 * @param {string} frameworks - MITRE ATT&CK, Cyber Kill Chain, NIST IR Lifecycle.
 * @param {string} tools - Splunk ES, Microsoft Defender for Endpoint, Nessus, Wireshark, Nmap, Burp Suite.
 * @param {string} interests - Threat hunting, web security, SOC home lab simulations, cyber defense.
 *
 * @throws {Threat} To suspicious activity.
 *
 * @returns {Object} SOCAnalyst.
 */
const SOCAnalyst = {
  name: "Koyya Naga Durga Prasad",
  role: "SOC Analyst | Cybersecurity Professional",
  location: "India",
  alertsHandled: "300+ daily",
  falsePositivesReduced: "30%+",
  mindset: "Detect -> Analyze -> Respond -> Improve",
  specializations: [
    "SIEM Monitoring",
    "Alert Triage",
    "IOC Investigation",
    "Incident Response",
    "Threat Detection",
    "Phishing Analysis"
  ],
  tools: [
    "Splunk Enterprise Security",
    "Microsoft Defender for Endpoint",
    "Wireshark",
    "Nmap",
    "Nessus",
    "Burp Suite",
    "Shodan",
    "VirusTotal",
    "Jira"
  ],
  frameworks: [
    "MITRE ATT&CK",
    "Cyber Kill Chain",
    "NIST IR Lifecycle"
  ]
};
!                      ________________             !
!                      \      __      /         __  !
!                       \_____()_____/         /  ) !
!                       '============`        /  /  !
!                        #---\  /---#        /  /   !
!                       (# @\| |/@  #)      /  /    !
!                        \   (_)   /       /  /     !
!                        |\ '---` /|      /  /      !
!                _______/ \\_____// \____/ o_|      !
!               /       \  /     \  /   / o_|       !
!              / |           o|        / o_| \      !
!             /  |  _____     |       / /   \ \     !
!            /   |  |===|    o|      / /\    \ \    !
!           |    |   \@/      |     / /  \    \ \   !
!           |    |___________o|__/----)   \    \/   !
!           |    '              ||  --)    \     |  !
!           |___________________||  --)     \    /  !
!                |           o|   ''''   |   \__/   !
!                |            |          |          !
!                                                   !
!               "DON'T CROSS THE DEFENDER..."       !
Tools

SIEM & SOC

splunk azure windows
Security Tools

python linux bash git
Networking

tcpip https dns
Programming

python sql


Threat Investigation

osint virustotal shodan
Web Security

web html css
Platforms

windows ubuntu kali


Professional Experience
  • SOC Analyst Intern β€” App Genesis
    • Monitored and triaged 300+ daily security alerts using Splunk Enterprise Security.
    • Investigated malicious IPs, domains, hashes, and processes using VirusTotal and Shodan.
    • Correlated logs across firewalls, endpoints, and Microsoft Defender for Endpoint.
    • Reduced false positives by 30%+ through correlation rule tuning and detection refinement.
    • Created Jira incident tickets with timelines, evidence, IOCs, and remediation steps.
  • Cyber Security Intern β€” APSSDC
    • Performed vulnerability assessments on 20+ assets using Nessus and Nmap.
    • Prioritized critical CVEs and contributed to reducing open critical vulnerabilities by 40%.
    • Prepared remediation-focused reports with CVSS-based severity analysis.
Projects
  • SOC Mini Home Lab β€” SIEM Monitoring & Attack Simulation
    Built a virtual SOC lab with Splunk ES and forwarders, simulated brute-force and scanning attacks, wrote SPL detections for Event ID 4625 anomalies, and created authentication monitoring dashboards.

  • Phishing Email Investigation
    Performed SMTP header analysis, extracted indicators of compromise, validated malicious artifacts through threat intelligence sources, and documented the attack chain and defensive recommendations.

  • PortSwigger Web Security Practice β€” 80+ Labs
    Practiced exploitation of SQL Injection, XSS, IDOR, broken authentication, and access control issues aligned with OWASP Top 10 methodology.
Operations Log
root@SOC:~# initialize --monitoring
[+] Loading Splunk ES...
[+] Connecting to endpoints...
[+] Correlating firewall, endpoint, and authentication logs...
[+] Mapping suspicious behavior to MITRE ATT&CK...
[βœ”] SOC environment active.

root@SOC:~# detect --ioc
[!] Suspicious IP / domain / hash observed...
[βœ”] Validated via OSINT, VirusTotal, and Shodan.

root@SOC:~# respond --incident
[βœ”] Jira ticket created
[βœ”] Timeline documented
[βœ”] Escalated to L2
[βœ”] SLA maintained

root@SOC:~# hunt --phishing
[βœ”] Header analyzed
[βœ”] Indicators extracted
[βœ”] Attack chain documented

root@SOC:~# report --status
[βœ”] Threat contained
[βœ”] Detection logic improved
Quote
β€œAttackers need one successful attempt. Defenders improve with every alert.”
β€” Blue Team Mindset
What can I do for you?

Let's Work on Security Together

I enjoy working on SOC workflows, threat detection, log analysis, phishing investigations, and practical cyber defense projects.

Core Strengths

Security

β€œDetection without analysis is noise. Analysis without action is delay.”

Bottom of pokeball

+@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @+
@@                                                            @@
@@    DETECT  ->  ANALYZE  ->  RESPOND  ->  DEFEND           @@
@@                                                            @@
@@    300+ alerts monitored daily                             @@
@@    30%+ false positives reduced                            @@
@@    MITRE ATT&CK aligned investigations                     @@
@@    Splunk ES driven monitoring                             @@
@@    Phishing analysis and IOC validation                    @@
@@                                                            @@
@@    while( monitoring ) {                                   @@
@@        triage_alerts();                                    @@
@@        investigate_iocs();                                 @@
@@        tune_detections();                                  @@
@@        escalate_if_needed();                               @@
@@    }                                                       @@
@@                                                            @@
@@    "Security is built through discipline and response."    @@
@@                                                            @@
+@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @+

FUN FACT πŸ€” : Cybersecurity is not just about blocking threats β€” it is about understanding attacker behavior and improving every detection cycle.

repos followers email

Β 

╔═ πŸ‘€ 𝕐 𝕆 π•Œ ℝ 𝕋 ℍ ℝ 𝔼 𝔸 𝕋 𝕄 𝕆 𝔻 𝔼 πŸ‘€

β•šβ•β•β•β•β• πˆπ“'𝐒 πƒπ€π‘πŠβš«ππ‘πˆπ†π‡π“βšͺ 𝐈𝐍 𝐇𝐄𝐑𝐄...

Profile mode: ACTIVE DEFENDER

πˆπ… π˜πŽπ” 𝐑𝐄𝐀𝐂𝐇𝐄𝐃 𝐇𝐄𝐑𝐄 ( C O N G R A T S πŸŽ‰πŸŽˆπŸŽŠ )

π‚π‡π„π‚πŠ πŽπ”π“ 𝐓𝐇𝐄𝐒𝐄:

β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β•šβ•β•β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β•β•β•šβ•β•β–ˆβ–ˆβ•”β•β•β•
β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—     β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘        β–ˆβ–ˆβ•‘   
β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•     β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•”β•β•β•  β–ˆβ–ˆβ•‘        β–ˆβ–ˆβ•‘   
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•‘   
β•šβ•β•β•β•β•β• β•šβ•β•β•β•β•β•β•   β•šβ•β•   β•šβ•β•β•β•β•β•β• β•šβ•β•β•β•β•β•   β•šβ•β•   

 β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β•šβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β•β•
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  
β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘    β•šβ–ˆβ–ˆβ•”β•  β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•  
β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
β•šβ•β•  β•šβ•β•β•šβ•β•  β•šβ•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•β•β•β•β•β•β•šβ•β•   β•šβ•β•β•β•β•β•β•β•šβ•β•β•β•β•β•β•

β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— 
β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘
β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•  β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β• β–ˆβ–ˆβ•”β•β•β•  β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘
β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•
β•šβ•β•  β•šβ•β•β•šβ•β•β•β•β•β•β•β•šβ•β•β•β•β•β•β•β•šβ•β•     β•šβ•β•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•β•β•šβ•β•β•β•β•β•

Pinned Loading

  1. SOC-Mini-Homelab SOC-Mini-Homelab Public

    SOC Mini Homelab using Splunk SIEM with Windows, Windows Server and Ubuntu log forwarding

    1

  2. Phishing-Email-Investigation Phishing-Email-Investigation Public

    SOC-style phishing email investigation covering header analysis, IOC extraction, URL and attachment analysis, and threat classification.

  3. log-analysis-brute-force-detection-splunk log-analysis-brute-force-detection-splunk Public

    End-to-end SOC project simulating RDP brute-force attack, remote access, and detection using Splunk SIEM with log analysis, correlation, and network traffic inspection.

    1

  4. RDP-Brute-Force-Detection-using-Splunk-Windows-Logs-Jira RDP-Brute-Force-Detection-using-Splunk-Windows-Logs-Jira Public

    SOC lab simulating RDP brute-force attack detection using Splunk SIEM, Windows Event Logs (4625/4624), Jira ticketing, and L1/L2 incident response workflow.

  5. keyboard-monitoring-security-lab keyboard-monitoring-security-lab Public

    Educational keyboard monitoring lab for SOC and blue team learning, demonstrating keystroke logging behavior and defensive detection concepts.

    Python

  6. titan-shield-cyber-incident-investigation titan-shield-cyber-incident-investigation Public

    SOC-style cyber incident investigation using KQL, Microsoft Defender XDR, and threat intelligence to analyze phishing, malware execution, data exfiltration, and nation-state threat actors.