Google Cybersecurity Certified

Dhruvkumar

Specializing in SIEM investigation, incident response & threat detection. Building AI-powered security infrastructure to protect organizations at scale.

SIEM / Splunk Incident Response Network Security Cloud Security Log Analysis Threat Detection .NET Core Python Wireshark AI/ML Security Blockchain

Defending the Digital Frontier

I'm an aspiring SOC Analyst and B.Sc. IT student with a deep passion for cybersecurity. My focus is on SIEM investigations, security alert analysis, and building incident response workflows that detect threats before they become breaches.

From log analysis and phishing detection to cloud security fundamentals, AI-driven threat analysis, and blockchain security exploration, I'm constantly building hands-on skills through labs, certifications, and real-world simulation projects.

SIEM Investigation
Deep-dive log analysis using Splunk and Chronicle to identify suspicious patterns and security incidents
Incident Response
Alert triage, escalation procedures, and containment strategies following NIST frameworks
Cloud Security
Security fundamentals for AWS/Azure/GCP — IAM, network policies, and compliance monitoring
AI-Driven Security
Leveraging machine learning for automated threat detection, log correlation, and anomaly identification
Network Security
Packet analysis, firewall rules, DNS security, and network traffic monitoring with Wireshark
Secure Development
.NET Core backend development with secure coding practices, input validation, and API security

Incident Response Lifecycle

A structured approach to security incident management following NIST & SANS frameworks.

Detect

Identify security events through SIEM monitoring, threat intelligence feeds, and automated alerting systems.

Analyze

Investigate alerts, correlate data across sources, and determine threat severity and scope of impact.

Contain

Isolate affected systems, block malicious activity, and prevent lateral movement within the network.

Eradicate

Remove threat artifacts, patch vulnerabilities, and eliminate root cause to prevent reinfection.

Recover

Restore operations, validate system integrity, document lessons learned, and update security controls.

Hands-On Security Labs

Real cybersecurity projects — not just theory. Built with production-grade tools and real-world attack simulations.

CRITICAL

01 / SIEM

SOC Log Analysis Lab

Built a complete SOC analyst lab using Splunk with custom log ingestion pipelines. Analyzed Windows Event Logs, Sysmon data, and firewall logs to detect brute-force attacks, lateral movement, and data exfiltration.

15+ Attack Patterns Detected
Splunk SIEM Windows Logs Sysmon
View on GitHub
HIGH

02 / Email Security

Phishing Email Detection

Developed a phishing detection simulation analyzing email headers, URLs, and social engineering indicators. Built classification rules for legitimate, suspicious, and malicious categorization.

94% Accuracy — 500+ Test Emails
Python Email Analysis Threat Intel Social Engineering
View on GitHub
HIGH

03 / Network Security

Network Traffic Analyzer

Network traffic analysis using Wireshark and tcpdump to capture, filter, and analyze packets. Identified suspicious connections, DNS tunneling attempts, and unauthorized data transfers.

8 Attack Types Identified
Wireshark tcpdump Packets DNS Security
View on GitHub
MEDIUM

04 / AI Security

AI Threat Report Generator

AI-assisted tool that automatically generates structured threat intelligence reports from raw security logs. Uses NLP to summarize incidents, extract IOCs, and suggest remediation steps.

70% Reduction in Report Time
Python AI/ML NLP Threat Intel
View on GitHub

Services & Expertise

End-to-end cybersecurity services — from threat detection to secure architecture.

Security Log Investigation

Deep-dive SIEM log analysis to identify anomalies, suspicious patterns, and potential security incidents across enterprise environments.

  • Splunk & Chronicle analysis
  • Windows Event Log review
  • Firewall log correlation
  • Alert pattern identification

SOC Alert Review & Triage

Systematic security alert review, prioritization, and triage following industry-standard incident response frameworks.

  • Alert prioritization
  • Incident escalation
  • NIST framework alignment
  • Containment strategies

Vulnerability Assessment

Identifying security weaknesses in systems and networks through scanning, analysis, and actionable remediation recommendations.

  • System vulnerability scanning
  • Risk assessment
  • Remediation planning
  • Security posture review

Security Documentation

Creating comprehensive security policies, incident response playbooks, and compliance documentation aligned with standards.

  • Policy development
  • Incident playbooks
  • Compliance reports
  • Technical documentation

Secure API Development

Building backend APIs with .NET Core implementing authentication, authorization, input validation, and secure coding practices.

  • .NET Core / C# backend
  • JWT authentication
  • Input validation & sanitization
  • OWASP best practices

AI Security Automation

Leveraging AI and ML to automate threat detection, log correlation, and security report generation for faster response.

  • Automated threat detection
  • Log correlation engines
  • IOC extraction
  • Report generation

Tools & Technologies

Enterprise-grade security tools and technologies used in real-world environments.

Splunk SIEM
Chronicle Google SIEM
Wireshark Packet Analysis
Python Automation
.NET Core Secure Dev
Nmap Network Scan
Burp Suite Web Security
Kali Linux Pen Testing
Snort IDS/IPS
AWS / Azure Cloud Security
TryHackMe Training
Git Version Control

“Security is not a product, but a process. It’s not a technology problem — it’s a people problem.”

— Inspired by Bruce Schneier

Professional Certifications

Industry-recognized certifications validating real-world cybersecurity skills.

Google Cybersecurity Professional Certificate

Google · Coursera

Comprehensive program covering security fundamentals, risk management, threat analysis, SIEM tools, incident response, Python automation, and Linux administration.

SIEM Python Linux Incident Response Risk Management
Verified

Hands-On Labs & Simulations

Self-Directed Learning

Extensive hands-on practice through TryHackMe rooms, HackTheBox challenges, and custom-built security labs covering penetration testing, log analysis, and network forensics.

TryHackMe Log Analysis Network Forensics Pen Testing
Active

Not Just a Student.
A Security-First Thinker.

I don't just study cybersecurity — I build labs, simulate attacks, and develop tools that solve real security challenges.

0
Security Projects
0
Security Tools
0
Google Certification
Passion & Drive

Let's Build
A Safer Digital World

Interested in cybersecurity collaboration? Looking for a security-minded developer? I'm available for internships, freelance projects, and learning opportunities.

Email dhruvkumardobariya641@gmail.com
Location Surat, Gujarat, India — Available Worldwide
Response Time Within 24 hours
Encryption Messages transmitted securely via TLS
Email Me Directly
Message Secured & Delivered!

Transmission complete. I'll respond within 24 hours via encrypted channel.