π© SYSTEM_READY
OPERATOR_PROFILE
Identity: Muhil M
Class: Cybersecurity Analyst / Threat Hunter
Origin: Chennai, IN
Clearance: Top 1% TryHackMe (User: lasthacker)
Status: ACTIVE / OPEN FOR DEPLOYMENT
π‘ Signal Trace (Background)
I bridge the gap between kinetic military operations and digital security.
Formerly a Signaller Communication Specialist for the Singapore Armed Forces (35 SCE), I operated secure tactical communication systems and managed cryptographic keys in mission-critical scenarios.
Now, I apply that same discipline to Cybersecurity. I donβt just monitor logs; I hunt for anomalies. My focus is Blue Team Operations, SIEM Architecture, and Threat Analysis.
π Credentials & Armor
| CERTIFICATION | ID / STATUS |
|---|---|
| CompTIA Security+ | β Verified |
| CompTIA Network+ | β Verified |
| AWS Cloud Practitioner | β Verified |
| B.Tech Cybersecurity | π 9.7 CGPA (SRM Institute) |
π οΈ System_Configuration (Skills)
skills:
offensive: [ "Burp Suite", "Metasploit", "Nmap", "LLM Exploitation" ]
defensive: [ "Wazuh SIEM", "Splunk", "Velociraptor", "Snort/Suricata" ]
scripting: [ "Python", "Bash", "PowerShell" ]
research: "Published Author (IEEE ICCPCT 2025)"π Mission_Logs (Projects)
β Project: Home Lab SIEM
Objective: Centralized Log Analysis
- Deployed Wazuh with Linux/Windows agents.
- Engineered custom Sigma rules to detect suspicious login activity.
- Built Kibana dashboards for real-time threat visualization.
π§ Project: SOC Operations (Use-Cases & Playbooks)
Objective: Operational Detection & Response
- Authored triage/runbooks for phishing, brute-force, malware, and lateral movement.
- Created Splunk correlation searches; mapped detections to MITRE ATT&CK.
- Drove MTTD/MTTR reduction by tuning noise and enriching alerts with context.
π‘οΈ Project: SOAR & EDR Integration (SOAR Lab)
Objective: Automated Incident Response
- Integrated TheHive, Cortex, and Velociraptor.
- Designed automation for alert enrichment, file-hash lookups, and IOC pivoting.
β οΈ Project: LLM Vulnerability Research
Objective: Offensive AI Testing
- Publication: Presented at IEEE International Conference (2025).
- Analyzed and exploited security flaws in Large Language Models.
π Project: Safecode-Scanner
Objective: Static Analysis Tool
- Developed a Python-based scanner to detect hardcoded credentials and secrets.
π Project: Cowrie Honeypot
Objective: Threat Intelligence
- Deployed SSH honeypot to capture unauthorized login attempts and TTPs.
- Scripted real-time Slack alerts for attacker behavior and IOC collection.