Skip to content
View sovandas089's full-sized avatar
:shipit:
Thank you For Visiting ☺️
:shipit:
Thank you For Visiting ☺️

Block or report sovandas089

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
sovandas089/README.md

πŸ‘Ύ Sovan Das

Aspiring SOC Analyst | Blue Team Defender | Threat Hunter

Typing SVG

LinkedIn Email Hack The Box TryHackMe


🧠 About Me

class SOCAnalyst:
    def __init__(self):
        self.name        = "Sovan Das"
        self.location    = "Raigarh, Chhattisgarh, India"
        self.role        = "Aspiring SOC Analyst"
        self.education   = "B.Tech CSE @ O.P. Jindal University (2026)"
        self.htb_rank    = "#979 Globally"
        self.achievement = "WorldSkills India β€” Gold Medalist (Cyber Security)"

    def focus_areas(self):
        return [
            "Threat Detection & Alert Triage",
            "SIEM Engineering (Splunk)",
            "Log Analysis & Incident Response",
            "Network & Memory Forensics",
            "Blue Team Operations",
        ]

    def current_mission(self):
        return "Building SOC-grade tools while hunting for my first SOC role 🎯"

me = SOCAnalyst()

πŸ† Achievements & Certifications

πŸ₯‡ Achievement
πŸ… WorldSkills India β€” Gold Medalist, Cyber Security (State Level)
🎯 Hack The Box β€” Global Rank #979
πŸ“œ CompTIA Network+ Certified (N10-008) β€” Packt, Nov 2025
πŸ–₯️ Operating Systems β€” IBM, Aug 2025
🐍 Python for Cyber Security β€” INFOSEC, Jun 2025
πŸ“‘ CompTIA Security+ (SY0-701) β€” In Progress (Expected May 2026)

πŸ› οΈ Tech Stack & Skills

Languages & Scripting

Python Shell Script

SIEM & Monitoring

Splunk Windows

Networking & Forensics

Wireshark Nmap

Operating Systems

Kali Ubuntu Windows Server Parrot OS

πŸ” Cybersecurity Domains

βœ… SIEM Engineering        β†’  Splunk log ingestion, dashboards, detection rules, alert triage
βœ… Active Directory        β†’  AD administration, event log monitoring, privilege escalation detection
βœ… Incident Response       β†’  Alert triage, threat hunting, log correlation
βœ… Network Forensics       β†’  Wireshark, TCPdump, PCAP analysis (Scapy)
βœ… Memory Forensics        β†’  Artifact extraction, process analysis
βœ… Web Security            β†’  OWASP Top 10, WAF implementation, SQLi/XSS detection
βœ… Threat Frameworks       β†’  MITRE ATT&CK mapping
βœ… Server Hardening        β†’  Linux & Windows hardening, SSH security, firewall rules
βœ… Cryptography            β†’  SSL/TLS, encryption fundamentals

πŸš€ Featured Projects

Real-world SOC simulation in a virtualized environment

  • Built a Windows Active Directory environment integrated with Splunk SIEM for centralized log collection
  • Ingested and analyzed Windows Security Event Logs to track logins, account changes, and policy violations
  • Created custom detection rules and dashboards to identify unauthorized access and privilege escalation in real time

Python-powered threat detection for Linux environments

  • Built a Linux-based log monitoring system using Python & Shell scripting for fully automated analysis
  • Parsed authentication and system logs to surface anomalies and unauthorized access attempts
  • Implemented rule-based alerting for brute-force attacks, root SSH access, and privilege escalation events

Production-grade WAF with real-time SOC dashboard

  • Built a Python-based reverse proxy WAF (FastAPI) to inspect HTTP traffic and block attacks via a threat scoring engine
  • Implemented detection for SQLi, XSS, and brute-force with automated alerting, logging, and IP blocking (with timed unblocking)
  • Enabled PCAP-based forensic analysis using Scapy and a live SOC dashboard for real-time threat visibility

πŸ“Š GitHub Stats

GitHub Streak


🎯 Practice Platforms

Hack The Box TryHackMe Blue Team Labs LetsDefend


πŸ“Œ Currently

  • πŸ” Preparing for CompTIA Security+ (SY0-701) β€” Expected May 2026
  • 🎯 Climbing the ranks on Hack The Box (currently #979 globally)
  • πŸ”­ Expanding my SOC home lab with new detection use cases
  • πŸ’Ό Actively seeking an entry-level SOC Analyst role


πŸ’¬ SOC Analyst Mindset

SOC Analyst Quotes

🀝 Let's Connect

LinkedIn Email

Visitor Count

Pinned Loading

  1. Setup-VsCode Setup-VsCode Public

  2. Active-Directory-HomeLab Active-Directory-HomeLab Public

    A virtual cybersecurity lab setup integrating Active Directory and Splunk for log monitoring and attack detection. Built using Windows Server, Ubuntu (Splunk Server), Windows 10 client, and Kali Li…

    1 1

  3. Log-Analyzer Log-Analyzer Public

    Log anlyzer and Alerting system

    1

  4. WAF-IDS WAF-IDS Public

    Python