About me

Hi, I'm Kush! 👋

As a cybersecurity professional with a Master's from NJIT, I've dedicated myself to protecting digital infrastructures and investigating security incidents. My journey in information security has led me through diverse roles, from hands-on incident response to sophisticated threat hunting and SIEM implementations.

I'm particularly passionate about security operations and digital forensics, where I've had the opportunity to work with tools like Splunk, Azure Sentinel, and Autopsy. Whether it's analyzing malware, hunting threats, or developing incident response playbooks, I thrive on solving complex security challenges.

My experience spans across SOC operations, vulnerability management, and network security, complemented by industry certifications like CompTIA Security+, Security Blue Team - Blue Team Level 1, ISC2 CC, and IBM CySA. I believe in continuous learning and staying ahead of evolving cyber threats.

I'm currently seeking opportunities where I can contribute to strengthening organizations' security postures while continuing to grow in areas like threat intelligence and advanced incident response. When I'm not diving into security logs or testing new detection rules, you'll find me working on personal security projects or exploring the latest developments in cybersecurity.

Let's connect and make the digital world a safer place! 🛡️

What I'm doing 🧑🏻‍💻

  • design icon

    Security Information & Event Management

    Monitoring security events and analyzing threat patterns across enterprise environments using Splunk Enterprise and Azure Sentinel.

  • Red Team icon

    Red Team Activities

    Conducting controlled penetration testing using tools like Metasploit and Burp Suite to identify security gaps before attackers do.

  • Network Security icon

    Network Security

    Monitoring and securing network infrastructure using Wireshark, IDS/IPS tools, and firewall configurations to detect and prevent intrusions.

  • Vulnerability Assessment Icon

    Vulnerability Assessments

    Performing systematic security assessments using Nessus and OpenVAS and other methodoliges like SAST & DAST to identify, classify, and remediate vulnerabilities.

  • Incident Response Icon

    Incident Response

    Developing and implementing incident response playbooks while conducting root cause analysis of security incidents.

  • Digital Forensics Icon

    Digital Forensics

    Investigating compromised systems using Autopsy and Volatility to recover digital evidence and reconstruct attack timelines.

Badges 🔰

Certifications 🏆

Resume

Education

  1. New Jersey Institute of Technology

    2022 — 2024

    Master of Science in Cybersecurity & Privacy.

    CGPA - 3.9 / 4.0

  2. Nagpur University, India

    2016 — 2020

    Bachelor of Engineering in Information Technology.

    CGPA - 3.0/4.0

Experience

  1. Information Security Analyst

    Rebecca Everlene Trust Company Aug 2024 — Present

  2. Network Support Assistant

    New Jersey Institute of Technology June 2023 — May 2024

Portfolio

Skills & Tools

Skills

  • Python
  • Network Protocols TCP/IP
  • SQL
  • Powershell & Bash
  • HTML & CSS
  • XML & YML
  • Threat Detection
  • Incident Response
  • Firewall Configuration
  • Extended Detection & Response(XDR)
  • Endpoint Configuration
  • Security Information and Event Management(SIEM)
  • Intrusion Detection & Prevention
  • Statistical Analysis
  • Data Loss Prevention
  • Network Access Control
  • Monitoring & Log Analysis
  • Virtualization

Tools

  • Splunk

    Splunk

  • QRADAR

    QRADAR

  • Nessus

    Nessus

  • Burp Suite

    Burp Suite

  • NMAP

    NMAP

  • LimaCharlie

    LimaCharlie

  • Wireshark

    Wireshark

  • Docker

    Docker

  •  Microsoft Suite

    Microsoft Suite

Contact

" width="400" height="300" loading="lazy">

Contact Details

Email

Primary: kush.borikar@gmail.com
Secondary: borikarkush@gmail.com

Phone

+1 (408) 460-0243

Location

Based in San Francisco, California.
Open to relocating anywhere in the United States.