Hi, I'm Ankesh Kumar Yadav
Cybersecurity Professional | SOC Analyst Aspirant
Passionate about defending digital assets and hunting threats. Dedicated to building a career in Security Operations with hands-on experience in network security, vulnerability assessment, and incident response.

To obtain a challenging position as a SOC Analyst where I can leverage my knowledge of network security, threat detection, and incident response to protect organizations from cyber threats. Committed to continuous learning and professional development in defensive security operations, with a focus on real-time security monitoring and proactive threat hunting.
Know Me More
I am a passionate cybersecurity enthusiast with a strong drive to protect organizations from evolving cyber threats. My journey into cybersecurity started with a deep curiosity about how systems work and how they can be defended.
Through extensive hands-on lab experience on platforms like TryHackMe and HackTheBox, I have developed practical skills in network analysis, threat detection, and vulnerability management. I believe in continuous learning and staying up to date with the latest security trends and attack vectors.
My goal is to contribute to a SOC team where I can apply my skills in real-world scenarios, defend critical infrastructure, and grow as a cybersecurity professional.
Technical Skills
SOC & Cybersecurity
Networking
Operating Systems
Security Tools
Programming & Query
Concepts & Frameworks
Tools Proficiency
What I Can Do
Security Monitoring
Monitor security events and alerts using SIEM tools like Splunk. Analyze logs to detect suspicious activities and potential security incidents.
Log Analysis & Threat Detection
Analyze system and network logs to identify anomalies, brute-force attempts, and indicators of compromise (IOCs) using event correlation techniques.
Network Traffic Analysis
Capture and inspect network traffic using Wireshark to identify malicious patterns, suspicious DNS queries, and abnormal HTTP activity.
Incident Response (Basics)
Support basic incident response by investigating alerts, understanding attack techniques using MITRE ATT&CK, and assisting in threat containment.
My Projects
SIEM Log Analysis & Threat Detection
Analyzed 5,000+ system and network log events using Splunk to detect brute-force attacks and unauthorized access attempts. Created dashboards and alerts to monitor security events and improve threat visibility.
Network Traffic Analysis
Captured and analyzed network packets using Wireshark to identify suspicious traffic patterns. Investigated DNS queries, HTTP traffic, and indicators of compromise (IOCs) for potential threats.
Vulnerability Scanning & Enumeration
Performed network scanning using Nmap to identify open ports and running services. Conducted basic enumeration and vulnerability assessment of target systems.
Security Monitoring & Incident Response Basics
Applied SOC concepts such as alert monitoring, log correlation, and basic incident response using MITRE ATT&CK framework to understand attacker techniques and improve detection strategies.
Practical Experience
Splunk (SIEM Practice)
Worked on log analysis, dashboard creation, and alert generation to detect brute-force attacks and suspicious activities.
Wireshark (Traffic Analysis)
Captured and analyzed network packets to investigate DNS queries, HTTP traffic, and identify indicators of compromise (IOCs).
Nmap (Scanning & Enumeration)
Performed network scanning to identify open ports, services, and basic vulnerabilities using Nmap in a controlled lab environment.
Microsoft Sentinel (Learning)
Currently learning cloud-based SIEM, KQL queries, and threat detection techniques for modern SOC environments.
My Certifications
My Resume
Explore my professional journey, certifications, skills, and hands-on cybersecurity experience.
Ankesh Kumar Yadav
SOC Analyst Aspirant | Cybersecurity Enthusiast | Ethical Hacking Certified
Why Choose Me
SOC-Focused Skillset
Hands-on experience with SIEM tools like Splunk, log analysis, and event correlation aligned with real-world SOC operations.
Threat Detection & Monitoring
Ability to detect brute-force attacks, unauthorized access attempts, and suspicious activities through continuous log monitoring.
Strong Networking Foundation
Good understanding of TCP/IP, DNS, HTTP/HTTPS, and network traffic analysis essential for identifying security threats.
Analytical & Detail-Oriented
Focused approach to analyzing logs, identifying anomalies, and investigating indicators of compromise (IOCs).
Continuous Learning in SOC Tools
Actively learning Microsoft Sentinel and KQL while strengthening knowledge of MITRE ATT&CK and threat detection techniques.