Siddh Samarth
Cybersecurity Analyst — I find threats before they find you.
SOC Operations · SIEM Engineering · Threat Detection · India
TRAINED & WORKED WITH
About Me
Cybersecurity Analyst & Threat Hunter
I am a Cybersecurity Analyst and BIT Mesra Computer Science graduate, actively seeking SOC Analyst, Threat Detection Engineer, and Security Operations roles. I specialize in Azure Sentinel SIEM, KQL-based detection engineering, network forensics, and Python-driven security automation.
I'm a Cybersecurity Analyst and BIT Mesra Computer Science graduate actively seeking SOC Analyst and Threat Detection Engineer roles across India. I specialize in Azure Sentinel SIEM engineering, KQL-based detection, network forensics, and Python-driven security automation — blending an attacker's mindset with defensive operations to detect threats faster and reduce false positives.
Currently open to full-time SOC Analyst, Threat Detection, and Security Operations roles. Available immediately.

Siddh Samarth
Turning vulnerabilities into strengths.
TryHackMe Profile
Core Expertise
SOC Operations & Threat Detection
- SOC Monitoring
- Threat Detection
- SIEM Operations
- Event Correlation
- Splunk
- IBM QRadar (familiar)
- CrowdStrike EDR
Incident Response & Analysis
- Incident Response
- Log Analysis
- Malware Analysis
- Network Forensics
- TheHive
- Malware Sandboxing
- VirusTotal
- AnyRun
Offensive Security
- Vulnerability Assessment
- OSINT
- Penetration Testing
- CEH Methodology
- Shodan
- Maltego
- theHarvester
- Recon-ng
Automation & Scripting
- Python Automation
- Bash Scripting
- Workflow Automation
- Tool Development
Tools & Technologies
SIEM & Security Platforms
Network Analysis
Security Testing
Development & Automation
Endpoint & EDR
Threat Intelligence
IDS / IPS & Network Monitoring
OSINT Tools
Incident Response & Ticketing
Analytical
Pattern detection, log correlation, and scenario-based reasoning with attacker-to-defender mindset.
Automation
Python and Bash scripting for OSINT tools, SOC utilities, and workflow automation.
Dual Perspective
Unique ability to blend offensive security logic into defensive operations for better threat detection.
Internship & field experience
Places where I turned theory into practice—from research internships to real-world documentation and coordination work.
IIT Patna — Code Vulnerability Analytic and Research Intern
May 2024 – July 2024
Performed symbolic and concolic execution analysis on 15+ Solidity smart contracts to surface exploitable vulnerabilities. Integrated LLM-assisted reasoning to improve detection accuracy, reducing false positive rate by ~30% compared to static analysis alone.
Teachnook — Trainee & Intern
Jan 2024 – Feb 2024
Analyzed live malware behavior across multiple network environments, identifying threat patterns and exploitation techniques. Mapped network vulnerabilities using Wireshark and Nmap, and produced structured remediation reports for each identified risk.
Dristi NGO, Deoghar — Documentation Head
Aug 2022 – Aug 2024
Led a 5-member documentation team for a social-impact NGO, managing security-sensitive records and stakeholder communications across a 2-year tenure. Implemented access-control practices for document handling, ensuring data integrity and confidentiality.
Featured Projects
Real-world security solutions and research initiatives
Solorigate Incident Response
Azure Sentinel SIEM · KQL Detection Engineering · Threat Hunting
Engineered end-to-end incident detection workflow. Utilized ASIM and KQL to normalize multi-source telemetry and streamline forensic handover.
Global Threat Visualization
Honeypot Deployment · Real-World Attack Data · Azure Sentinel Dashboard
Designed and deployed a honeypot to capture real-world attack data. Visualized 20,000+ malicious logon attempts on a world map.
Zero Trust Architecture
ELK Stack · Network Security Design · Crypto Exchange Case Study
Developed a consulting-level case study for a crypto exchange's network perimeter. Recommended and designed a Zero Trust model.
Threat Intelligence Integration
SOC L1 Framework · Python Automation · Threat Analysis Workflows
Demonstrated comprehensive Threat Intelligence Integration for SOC L1 Analysts. Built frameworks for threat detection, analysis, and response workflows.
Security Assessment via SDLC
DevSecOps · CI/CD Security · Vulnerability Scanning Automation
Implemented security assessment practices integrated throughout the Software Development Lifecycle. Automated security checks and vulnerability scanning in CI/CD pipelines.
Incident Response Framework
IR Playbooks · Digital Forensics · Containment & Recovery
Developed comprehensive incident response procedures and playbooks. Designed workflows for detection, containment, eradication, and recovery phases.
Technical Skills
Technologies and tools I work with daily
Programming Languages
Python · Bash · SQL · PowerShell
Libraries & Data
TensorFlow · Pandas · NumPy · Scapy · Socket · Regex/re
Security Domains
Network Analysis · Malware Analysis · OS Hardening · Log Analysis · Threat Hunting · Incident Response
SIEM & Security Platforms
Azure Sentinel · Splunk · Wazuh · IBM QRadar (familiar)
Endpoint & EDR
Microsoft Defender for Endpoint · CrowdStrike Falcon (studied) · VirusTotal · AnyRun · Hybrid Analysis
Network Analysis Tools
Wireshark · Nmap · Zeek · Suricata · Snort · Packet Analysis
Security Testing
Nessus · Burp Suite · Kali Linux · Nikto · Hashcat · Aircrack-ng
OSINT Tools
Shodan · Maltego · theHarvester · Recon-ng
Threat Intelligence
MISP · OpenCTI · VirusTotal Intelligence
Incident Response & Ticketing
TheHive · Jira · ServiceNow (familiar)
Development & Automation
Python · Bash · SQL · PowerShell · n8n
Currently Learning
CompTIA Security+ · CEH (in progress) · Cloud Security (Azure)
Academics
A security-focused computer science foundation supplemented with formal training in modern cyber security.
Birla Institute of Technology, Mesra
Bachelor of Technology in Computer Science and Engineering
- • Core CS foundations with focus on systems, security, and software engineering.
IIT Guwahati
Cyber Security Training Programme
- • Relevant coursework: Operating System, Database Management System, Cryptography and Network Security, Object Oriented Programming, OWASP Top 10.
Certificates
Professional certifications and training programs from leading institutions and platforms. Verified credentials in cybersecurity, blockchain, and social leadership.
IIT Guwahati
Daksh Gurukul Cyber Security
Certification Details
- •1 certificate from IIT Guwahati
- •Verified credentials with professional validation
- •Comprehensive training in cybersecurity and related fields
IIT Guwahati Certifications
Cyber Security Course – Daksh Gurukul
Premium security outcomes come from reasoning, context, and execution.
Signal-driven SIEM engineering beats alert noise
I design detection workflows in Azure Sentinel with KQL, ASIM normalization, and correlation logic so analysts see high-confidence signals, not clutter.
Network forensics turns packets into intent
From Wireshark/tcpdump to anomaly visualization, I decode C2 patterns, beaconing, and protocol misuse to surface attacker behavior early.
Security research that blends AI with execution
I pair symbolic + concolic analysis for smart contracts with ML-assisted telemetry to prioritize exploitability and reduce false positives.
Privacy-first research
My research does not compromise data integrity. I use sandboxed environments and isolated tenant logic for all security testing.
Least-privilege execution
Architecting security workflows that only use the exact endpoints and secrets required, reducing accidental cross-task data exposure.
Isolated environments
Every security test runs in fresh, disposable containers with strict resource usage controls and forensic-grade log capture.
Audit-grade reporting
Producing actionable proof-of-concepts and evidence-backed remediation paths that hold up under strict enterprise security audits.
Get In Touch
Let's talk security. Whether you're looking for a SOC Analyst, need a threat detection engineer, or just want to geek out about KQL queries — my inbox is open.