Available for opportunities

Logeshwaran SSecurity Analyst

SOC Analyst · VAPT Practitioner · Vulnerability Researcher. I break things to understand them, then build defenses that last.

🛡 SOC / Blue Team ⚔ VAPT / Pentesting ⚙ Security Engineering
logesh@sec-ops ~
whoami
logeshwaran_s // cybersec_analyst

cat disclosures.txt
Google Android VRP — VALIDATED ✓
NVIDIA PSIRT — VALIDATED ✓
CERT-In (Gov) — VALIDATED ✓
+ 3 more orgs — RESOLVED ✓

status --current
Open to: SOC · VAPT · SecEng roles

Technical Skills

Covering the full spectrum — detect, exploit, and engineer.

SOC

SOC & Detection

  • SIEM — Splunk, Microsoft Sentinel
  • Alert Triage & Incident Response
  • Multi-source Log Analysis
  • MITRE ATT&CK Mapping
  • Threat Hunting Basics
88%
VAPT

VAPT & Disclosure

  • Web App Pentesting (OWASP Top 10)
  • Burp Suite — Manual Exploitation
  • XSS, Misconfig, Parameter Fuzzing
  • Bug Bounty & Responsible Disclosure
  • CVSS Scoring & VPAT Documentation
84%
ENG

Security Engineering

  • Python — Automation & Log Parsing
  • Bash Scripting
  • Honeypot & Deception Tools
  • Static Code Analysis
  • FastAPI · Streamlit Integration
78%
NET

Networking

  • TCP/IP · DNS · HTTP/HTTPS
  • Packet Analysis (Wireshark)
  • Network Traffic Investigation
  • Firewall & IDS/IPS Concepts
80%
SYS

Systems

  • Linux — Hardening & Log Analysis
  • Process Monitoring & Forensics
  • Windows Event Log Analysis
  • Endpoint Security & EDR Concepts
75%
ML

ML for Security

  • XGBoost — Network Attack Detection
  • SHAP — Explainable AI for Alerts
  • Feature Engineering on Traffic Data
  • SOC-Grade ML Deployment
72%
SIEM

SIEM Platforms

  • Splunk — Queries & Dashboards
  • Microsoft Sentinel
  • Alert Correlation & Triage
  • LetsDefend & TryHackMe Labs
88%
IR

Incident Response

  • Phishing & Malware Analysis
  • Brute-force Detection Labs
  • Privilege Escalation Investigation
  • MITRE ATT&CK Mapping
85%
TH

Threat Hunting

  • IOC Identification
  • Lateral Movement Detection
  • Anomaly Pattern Recognition
  • Escalation Workflow Design
80%
WEB

Web App Pentesting

  • OWASP Top 10
  • Burp Suite — Manual Exploitation
  • XSS, SQLi, IDOR, SSRF
  • Misconfiguration & Recon
86%
BB

Bug Bounty

  • Google Android VRP ✓
  • NVIDIA PSIRT ✓
  • CERT-In Government ✓
  • 6 Total Acknowledged Disclosures
82%
VR

Vulnerability Research

  • CVSS Scoring & VPAT Reports
  • Coordinated Disclosure Process
  • Parameter Fuzzing
  • CVE Research
78%
PY

Python Automation

  • Log Parsing & IOC Extraction
  • Security Automation Scripts
  • Static Code Analysis Engine
  • FastAPI REST Backend
78%
ML

ML for Security

  • XGBoost Classification
  • SHAP Explainability
  • Streamlit Dashboard
  • Network Traffic Features
74%
DEV

Tool Development

  • Honeytoken Systems
  • CI/CD Security Gates
  • Multi-format Report Generation
  • Real-time Alert Pipelines
76%

Professional Experience

2024 – Present
Red Team / BB

Vulnerability Researcher & Bug Bounty

Google VRP · NVIDIA PSIRT · CERT-In · 3 Others
  • Independently identified and disclosed vulnerabilities to Google Android VRP — confirmed duplicate of a live zero-day, validating independent discovery
  • Reported exposed system monitor logs to NVIDIA Omniverse PSIRT; full coordinated disclosure completed with official tracking ticket
  • Discovered critical credential exposure on Indian government website; received CERT-In official incident reference number
  • Additional acknowledged disclosures: University of Illinois (resolved), Imagine Art / Vyro.ai (resolved), UrbanPiper (commended)
  • Utilized Burp Suite, Linux, Python scripting for manual exploitation, PoC writing, CVSS scoring, and VPAT documentation
2024 – Present
Blue Team / SOC

SOC & Blue Team Lab Training

TryHackMe · LetsDefend
  • Completed hands-on SOC labs covering brute-force detection, phishing analysis, and privilege escalation investigation
  • Applied Splunk-style SIEM queries to identify suspicious activity patterns in simulated environments
  • Investigated phishing, malware, brute-force, and lateral movement scenarios using SIEM-style workflows
  • Mapped attacker TTPs to MITRE ATT&CK framework for structured threat analysis across multiple lab scenarios

Featured Projects

Production-grade security tools built from real-world threat scenarios

01

Smart-SOC

SOCML · XAI

XGBoost-based network attack classifier achieving ~74% detection accuracy on real traffic. Integrated SHAP explainability so every alert includes analyst-readable reasoning — no black-box decisions. Built FastAPI backend + Streamlit dashboard for real-time SOC triage.

02

ScriptSnoop

VAPTDevSecOps

Multi-language static code security scanner with 27 custom detection rules targeting RCE, SQL/command injection, hardcoded secrets, and path traversal. Severity-based triage with JSON/CSV/HTML reports. Integrates into CI/CD pipelines to enforce automated security gates on every commit.

03

Signal-Flare

SOCDeception Tech

Honeytoken credential system that detects post-exploitation activity the moment stolen credentials are used in the wild. Simulates realistic attacker behavior to validate triggers and minimize false positives. Applicable for insider threat detection, SOC early-warning, and deception-based defense.

04

VAPT Lab Reports

VAPTBug Bounty

Structured penetration testing writeups from TryHackMe labs and real-world bug bounty findings across Google, NVIDIA, CERT-In and 3 more organizations. Each report includes PoC exploits, CVSS scoring, coordinated disclosure correspondence, and professional remediation documentation.

Certifications & Education

Cisco Networking Basics

Completed

Cisco Cybersecurity Fundamentals

Completed

Cisco Linux Essentials

Completed

Infosys — Ethical Hacking

Completed

Infosys — Linux Fundamentals

Completed

Cisco Endpoint Security

In Progress

M.Tech — Computer Science Engineering (5 Year Integrated)

Erode Sengunthar Engineering College, Tamil Nadu · 2022–2027 · Focus: Web App Security, Network Security, VAPT
Ongoing

eJPT / CEH

Target 2026

CompTIA Security+

Planned

More Than a Resume

Security is what I do. Hockey, leadership, and relentless drive are who I am.

Hockey Captain · Sports Secretary

Captain on the Field,
Leader in the Lab

Leading the college hockey team as captain (#17) and serving as elected Sports Secretary of ESEC — managing inter-college tournaments, team logistics, and college-wide sports operations. The same leadership that wins matches drives how I handle incidents.

#17Jersey
3+Titles Won
Sports Sec.
Drive
🏆

Championship Winner

Inter-college hockey champion — discipline, strategy, and team leadership forged on the field and applied everywhere else.

🏃

Athlete & Runner

Marathon runner and calisthenics practitioner — the mental grit that fuels long runs keeps me sharp at 3AM SOC shifts.

📚

Mindset Driven

Atomic Habits · 48 Laws of Power · Rich Dad Poor Dad — books that shape how I think, compete, and grow daily.

Curious about the person behind the terminal?

There's a lot more to the story than skills and projects.

Explore My Full Story →

Let's Work Together

Open to SOC Analyst, VAPT / Pentesting, and Security Engineer roles. Always up for a conversation about security.

Get in touch.

Reach out directly or drop a message. I respond fast.

Open to roles
SOC Analyst VAPT Engineer Security Engineer Vulnerability Researcher
📍 Tamil Nadu, India·🌐 Remote-friendly