> WELCOME TO MY PORTFOLIO

Hi, I'm Ankesh Kumar Yadav

Cybersecurity Professional | SOC Analyst Aspirant

Passionate about defending digital assets and hunting threats. Dedicated to building a career in Security Operations with hands-on experience in network security, vulnerability assessment, and incident response.

Ankesh Kumar Yadav - Cybersecurity Professional
CAREER OBJECTIVE

To obtain a challenging position as a SOC Analyst where I can leverage my knowledge of network security, threat detection, and incident response to protect organizations from cyber threats. Committed to continuous learning and professional development in defensive security operations, with a focus on real-time security monitoring and proactive threat hunting.

Know Me More

I am a passionate cybersecurity enthusiast with a strong drive to protect organizations from evolving cyber threats. My journey into cybersecurity started with a deep curiosity about how systems work and how they can be defended.

Through extensive hands-on lab experience on platforms like TryHackMe and HackTheBox, I have developed practical skills in network analysis, threat detection, and vulnerability management. I believe in continuous learning and staying up to date with the latest security trends and attack vectors.

My goal is to contribute to a SOC team where I can apply my skills in real-world scenarios, defend critical infrastructure, and grow as a cybersecurity professional.

Network Security
Vulnerability Assessment
Web Application Security
Security Monitoring

Technical Skills

SOC & Cybersecurity

SIEM (Splunk - Basics)Log AnalysisEvent CorrelationAlert MonitoringIncident Response (Basics)Threat DetectionThreat IntelligenceMITRE ATT&CKIOC Identification

Networking

TCP/IPDNSHTTP/HTTPSNetwork Security MonitoringPacket AnalysisCCNA Fundamentals

Operating Systems

Linux (Ubuntu, Kali)WindowsCommand LineBasic System Administration

Security Tools

SplunkWiresharkNmapKali LinuxMicrosoft Sentinel (Learning)

Programming & Query

Python (Basics)PowerShell (Basics)KQL (Learning)

Concepts & Frameworks

OWASP Top 10Vulnerability AssessmentRisk AnalysisSecurity Monitoring

Tools Proficiency

Splunk (SIEM)Intermediate
WiresharkIntermediate
NmapIntermediate
Linux (Kali/Ubuntu)Strong
Networking (TCP/IP, DNS)Strong
Microsoft Sentinel (Learning)Basic

What I Can Do

Security Monitoring

Monitor security events and alerts using SIEM tools like Splunk. Analyze logs to detect suspicious activities and potential security incidents.

Log Analysis & Threat Detection

Analyze system and network logs to identify anomalies, brute-force attempts, and indicators of compromise (IOCs) using event correlation techniques.

Network Traffic Analysis

Capture and inspect network traffic using Wireshark to identify malicious patterns, suspicious DNS queries, and abnormal HTTP activity.

Incident Response (Basics)

Support basic incident response by investigating alerts, understanding attack techniques using MITRE ATT&CK, and assisting in threat containment.

My Projects

SIEM Log Analysis & Threat Detection

SplunkLog AnalysisEvent Correlation

Analyzed 5,000+ system and network log events using Splunk to detect brute-force attacks and unauthorized access attempts. Created dashboards and alerts to monitor security events and improve threat visibility.

View on GitHub

Network Traffic Analysis

WiresharkTCP/IPDNSHTTP

Captured and analyzed network packets using Wireshark to identify suspicious traffic patterns. Investigated DNS queries, HTTP traffic, and indicators of compromise (IOCs) for potential threats.

View on GitHub

Vulnerability Scanning & Enumeration

NmapKali LinuxNetwork Scanning

Performed network scanning using Nmap to identify open ports and running services. Conducted basic enumeration and vulnerability assessment of target systems.

View on GitHub

Security Monitoring & Incident Response Basics

SIEMMITRE ATT&CKThreat Detection

Applied SOC concepts such as alert monitoring, log correlation, and basic incident response using MITRE ATT&CK framework to understand attacker techniques and improve detection strategies.

View on GitHub

Practical Experience

Splunk (SIEM Practice)

SIEM Logs & Alerts

Worked on log analysis, dashboard creation, and alert generation to detect brute-force attacks and suspicious activities.

Wireshark (Traffic Analysis)

Packet Analysis

Captured and analyzed network packets to investigate DNS queries, HTTP traffic, and identify indicators of compromise (IOCs).

Nmap (Scanning & Enumeration)

Port Scanning

Performed network scanning to identify open ports, services, and basic vulnerabilities using Nmap in a controlled lab environment.

Microsoft Sentinel (Learning)

Cloud SIEM

Currently learning cloud-based SIEM, KQL queries, and threat detection techniques for modern SOC environments.

My Certifications

SOC Analyst Level 1 & 2 Masterclass

Udemy · 2026

Verify

Cyber Security-SOC and SIEM (SPLUNK&ELK) for Beginners

Udemy · 2026

Verify

The Complete Hands-On Cybersecurity Analyst Course

Udemy · 2026

Verify

Ethical Hacking (Elite)

NPTEL (IIT KHARAGPUR) · 2025

Verify

AWS For Everyone

Udemy · 2026

Verify

Cisco Certified Network Associate Trainning ( CCNA )

Webasha Technologies,Pune,India · 2026

Verify

Cybersecurity Job Simulation

Mastercard · 2026

Verify

Cyber Job Simulation

Delollite · 2026

Verify

Cybersecurity Analyst Job Simulation

TATA · 2026

Verify

My Resume

Explore my professional journey, certifications, skills, and hands-on cybersecurity experience.

Ankesh Kumar Yadav

SOC Analyst Aspirant | Cybersecurity Enthusiast | Ethical Hacking Certified

Why Choose Me

SOC-Focused Skillset

Hands-on experience with SIEM tools like Splunk, log analysis, and event correlation aligned with real-world SOC operations.

Threat Detection & Monitoring

Ability to detect brute-force attacks, unauthorized access attempts, and suspicious activities through continuous log monitoring.

Strong Networking Foundation

Good understanding of TCP/IP, DNS, HTTP/HTTPS, and network traffic analysis essential for identifying security threats.

Analytical & Detail-Oriented

Focused approach to analyzing logs, identifying anomalies, and investigating indicators of compromise (IOCs).

Continuous Learning in SOC Tools

Actively learning Microsoft Sentinel and KQL while strengthening knowledge of MITRE ATT&CK and threat detection techniques.

Contact Me