Siddh Samarth

Open to SOC Analyst & Threat Detection roles

Cybersecurity Analyst — I find threats before they find you.
SOC Operations · SIEM Engineering · Threat Detection · India

Azure SentinelWiresharkNmapNessusTensorFlowBash/PythonCEH PreparationCyber Security Training (IIT Guwahati)

TRAINED & WORKED WITH

BIT MESRAIIT GUWAHATIIIT PATNATEACHNOOKDRISTI-NGO

About Me

Cybersecurity Analyst & Threat Hunter

I am a Cybersecurity Analyst and BIT Mesra Computer Science graduate, actively seeking SOC Analyst, Threat Detection Engineer, and Security Operations roles. I specialize in Azure Sentinel SIEM, KQL-based detection engineering, network forensics, and Python-driven security automation.

I'm a Cybersecurity Analyst and BIT Mesra Computer Science graduate actively seeking SOC Analyst and Threat Detection Engineer roles across India. I specialize in Azure Sentinel SIEM engineering, KQL-based detection, network forensics, and Python-driven security automation — blending an attacker's mindset with defensive operations to detect threats faster and reduce false positives.

SOC OPERATIONSINCIDENT RESPONSEOFFENSIVE SECURITY

Currently open to full-time SOC Analyst, Threat Detection, and Security Operations roles. Available immediately.

Siddh Samarth – Cybersecurity Analyst

Siddh Samarth

Turning vulnerabilities into strengths.

TryHackMe Profile

Core Expertise

SOC Operations & Threat Detection

  • SOC Monitoring
  • Threat Detection
  • SIEM Operations
  • Event Correlation
  • Splunk
  • IBM QRadar (familiar)
  • CrowdStrike EDR

Incident Response & Analysis

  • Incident Response
  • Log Analysis
  • Malware Analysis
  • Network Forensics
  • TheHive
  • Malware Sandboxing
  • VirusTotal
  • AnyRun

Offensive Security

  • Vulnerability Assessment
  • OSINT
  • Penetration Testing
  • CEH Methodology
  • Shodan
  • Maltego
  • theHarvester
  • Recon-ng

Automation & Scripting

  • Python Automation
  • Bash Scripting
  • Workflow Automation
  • Tool Development

Tools & Technologies

SIEM & Security Platforms

SplunkAzure SentinelWazuh

Network Analysis

WiresharkNmapPacket Analysis

Security Testing

NessusBurp SuiteKali Linux

Development & Automation

PythonBashSQLn8n

Endpoint & EDR

CrowdStrike Falcon (studied)Microsoft Defender for EndpointVirusTotalAnyRunHybrid Analysis

Threat Intelligence

MISPOpenCTIVirusTotal Intelligence

IDS / IPS & Network Monitoring

SuricataSnortZeek (Bro)

OSINT Tools

MaltegoShodantheHarvesterRecon-ng

Incident Response & Ticketing

TheHiveJira (ticketing)ServiceNow (familiar)

Analytical

Pattern detection, log correlation, and scenario-based reasoning with attacker-to-defender mindset.

Automation

Python and Bash scripting for OSINT tools, SOC utilities, and workflow automation.

Dual Perspective

Unique ability to blend offensive security logic into defensive operations for better threat detection.

Internship & field experience

Places where I turned theory into practice—from research internships to real-world documentation and coordination work.

IIT Patna — Code Vulnerability Analytic and Research Intern

May 2024 – July 2024

Performed symbolic and concolic execution analysis on 15+ Solidity smart contracts to surface exploitable vulnerabilities. Integrated LLM-assisted reasoning to improve detection accuracy, reducing false positive rate by ~30% compared to static analysis alone.

Teachnook — Trainee & Intern

Jan 2024 – Feb 2024

Analyzed live malware behavior across multiple network environments, identifying threat patterns and exploitation techniques. Mapped network vulnerabilities using Wireshark and Nmap, and produced structured remediation reports for each identified risk.

Dristi NGO, Deoghar — Documentation Head

Aug 2022 – Aug 2024

Led a 5-member documentation team for a social-impact NGO, managing security-sensitive records and stakeholder communications across a 2-year tenure. Implemented access-control practices for document handling, ensuring data integrity and confidentiality.

Featured Projects

Real-world security solutions and research initiatives

Solorigate Incident Response

Azure Sentinel SIEM · KQL Detection Engineering · Threat Hunting

Engineered end-to-end incident detection workflow. Utilized ASIM and KQL to normalize multi-source telemetry and streamline forensic handover.

AZURE SENTINELKQLASIMTHREAT HUNTING

Global Threat Visualization

Honeypot Deployment · Real-World Attack Data · Azure Sentinel Dashboard

Designed and deployed a honeypot to capture real-world attack data. Visualized 20,000+ malicious logon attempts on a world map.

AZURE SENTINELHONEYPOTKQLVISUALIZATION

Zero Trust Architecture

ELK Stack · Network Security Design · Crypto Exchange Case Study

Developed a consulting-level case study for a crypto exchange's network perimeter. Recommended and designed a Zero Trust model.

ZERO TRUSTELK STACKNETWORK DESIGNCONSULTING

Threat Intelligence Integration

SOC L1 Framework · Python Automation · Threat Analysis Workflows

Demonstrated comprehensive Threat Intelligence Integration for SOC L1 Analysts. Built frameworks for threat detection, analysis, and response workflows.

THREAT INTELLIGENCESOC OPERATIONSPYTHONFRAMEWORK

Security Assessment via SDLC

DevSecOps · CI/CD Security · Vulnerability Scanning Automation

Implemented security assessment practices integrated throughout the Software Development Lifecycle. Automated security checks and vulnerability scanning in CI/CD pipelines.

DEVSECOPSSDLCSECURITY ASSESSMENTAUTOMATION

Incident Response Framework

IR Playbooks · Digital Forensics · Containment & Recovery

Developed comprehensive incident response procedures and playbooks. Designed workflows for detection, containment, eradication, and recovery phases.

INCIDENT RESPONSEFORENSICSPLAYBOOKSOPERATIONS

Technical Skills

Technologies and tools I work with daily

Programming Languages

Python · Bash · SQL · PowerShell

Libraries & Data

TensorFlow · Pandas · NumPy · Scapy · Socket · Regex/re

Security Domains

Network Analysis · Malware Analysis · OS Hardening · Log Analysis · Threat Hunting · Incident Response

SIEM & Security Platforms

Azure Sentinel · Splunk · Wazuh · IBM QRadar (familiar)

Endpoint & EDR

Microsoft Defender for Endpoint · CrowdStrike Falcon (studied) · VirusTotal · AnyRun · Hybrid Analysis

Network Analysis Tools

Wireshark · Nmap · Zeek · Suricata · Snort · Packet Analysis

Security Testing

Nessus · Burp Suite · Kali Linux · Nikto · Hashcat · Aircrack-ng

OSINT Tools

Shodan · Maltego · theHarvester · Recon-ng

Threat Intelligence

MISP · OpenCTI · VirusTotal Intelligence

Incident Response & Ticketing

TheHive · Jira · ServiceNow (familiar)

Development & Automation

Python · Bash · SQL · PowerShell · n8n

Currently Learning

CompTIA Security+ · CEH (in progress) · Cloud Security (Azure)

Academics

A security-focused computer science foundation supplemented with formal training in modern cyber security.

Birla Institute of Technology, Mesra

Bachelor of Technology in Computer Science and Engineering

  • Core CS foundations with focus on systems, security, and software engineering.
2021 – 2025

IIT Guwahati

Cyber Security Training Programme

  • Relevant coursework: Operating System, Database Management System, Cryptography and Network Security, Object Oriented Programming, OWASP Top 10.
2024 – 2025

Certificates

Professional certifications and training programs from leading institutions and platforms. Verified credentials in cybersecurity, blockchain, and social leadership.

IIT Guwahati

Daksh Gurukul Cyber Security

Certification Details

  • 1 certificate from IIT Guwahati
  • Verified credentials with professional validation
  • Comprehensive training in cybersecurity and related fields

IIT Guwahati Certifications

1 Total
Certificates verified1 items
📜
Cyber Security Course – Daksh Gurukul

Date: June 2024 – March 2025

Category: Advanced Cybersecurity · Government-backed

Premium security outcomes come from reasoning, context, and execution.

Signal-driven SIEM engineering beats alert noise

I design detection workflows in Azure Sentinel with KQL, ASIM normalization, and correlation logic so analysts see high-confidence signals, not clutter.

Network forensics turns packets into intent

From Wireshark/tcpdump to anomaly visualization, I decode C2 patterns, beaconing, and protocol misuse to surface attacker behavior early.

Security research that blends AI with execution

I pair symbolic + concolic analysis for smart contracts with ML-assisted telemetry to prioritize exploitability and reduce false positives.

Privacy-first research

My research does not compromise data integrity. I use sandboxed environments and isolated tenant logic for all security testing.

Least-privilege execution

Architecting security workflows that only use the exact endpoints and secrets required, reducing accidental cross-task data exposure.

Isolated environments

Every security test runs in fresh, disposable containers with strict resource usage controls and forensic-grade log capture.

Audit-grade reporting

Producing actionable proof-of-concepts and evidence-backed remediation paths that hold up under strict enterprise security audits.

Get In Touch

Let's talk security. Whether you're looking for a SOC Analyst, need a threat detection engineer, or just want to geek out about KQL queries — my inbox is open.

Available immediately · Open to full-time roles in India