About me
Hi, I'm Kush! 👋
As a cybersecurity professional with a Master's from NJIT, I've dedicated myself to protecting digital infrastructures and investigating security incidents. My journey in information security has led me through diverse roles, from hands-on incident response to sophisticated threat hunting and SIEM implementations.
I'm particularly passionate about security operations and digital forensics, where I've had the opportunity to work with tools like Splunk, Azure Sentinel, and Autopsy. Whether it's analyzing malware, hunting threats, or developing incident response playbooks, I thrive on solving complex security challenges.
My experience spans across SOC operations, vulnerability management, and network security, complemented by industry certifications like CompTIA Security+, Security Blue Team - Blue Team Level 1, ISC2 CC, and IBM CySA. I believe in continuous learning and staying ahead of evolving cyber threats.
I'm currently seeking opportunities where I can contribute to strengthening organizations' security postures while continuing to grow in areas like threat intelligence and advanced incident response. When I'm not diving into security logs or testing new detection rules, you'll find me working on personal security projects or exploring the latest developments in cybersecurity.
Let's connect and make the digital world a safer place! 🛡️
What I'm doing 🧑🏻💻
-
Security Information & Event Management
Monitoring security events and analyzing threat patterns across enterprise environments using Splunk Enterprise and Azure Sentinel.
-
Red Team Activities
Conducting controlled penetration testing using tools like Metasploit and Burp Suite to identify security gaps before attackers do.
-
Network Security
Monitoring and securing network infrastructure using Wireshark, IDS/IPS tools, and firewall configurations to detect and prevent intrusions.
-
Vulnerability Assessments
Performing systematic security assessments using Nessus and OpenVAS and other methodoliges like SAST & DAST to identify, classify, and remediate vulnerabilities.
-
Incident Response
Developing and implementing incident response playbooks while conducting root cause analysis of security incidents.
-
Digital Forensics
Investigating compromised systems using Autopsy and Volatility to recover digital evidence and reconstruct attack timelines.
Badges 🔰