🚩 SYSTEM_READY

OPERATOR_PROFILE

Identity: Muhil M
Class: Cybersecurity Analyst / Threat Hunter
Origin: Chennai, IN
Clearance: Top 1% TryHackMe (User: lasthacker)
Status: ACTIVE / OPEN FOR DEPLOYMENT


πŸ“‘ Signal Trace (Background)

I bridge the gap between kinetic military operations and digital security.

Formerly a Signaller Communication Specialist for the Singapore Armed Forces (35 SCE), I operated secure tactical communication systems and managed cryptographic keys in mission-critical scenarios.

Now, I apply that same discipline to Cybersecurity. I don’t just monitor logs; I hunt for anomalies. My focus is Blue Team Operations, SIEM Architecture, and Threat Analysis.


πŸ” Credentials & Armor

CERTIFICATIONID / STATUS
CompTIA Security+βœ… Verified
CompTIA Network+βœ… Verified
AWS Cloud Practitionerβœ… Verified
B.Tech CybersecurityπŸŽ“ 9.7 CGPA (SRM Institute)

πŸ› οΈ System_Configuration (Skills)

skills:
  offensive: [ "Burp Suite", "Metasploit", "Nmap", "LLM Exploitation" ]
  defensive: [ "Wazuh SIEM", "Splunk", "Velociraptor", "Snort/Suricata" ]
  scripting: [ "Python", "Bash", "PowerShell" ]
  research:  "Published Author (IEEE ICCPCT 2025)"

πŸ“‚ Mission_Logs (Projects)

βœ… Project: Home Lab SIEM

Objective: Centralized Log Analysis

  • Deployed Wazuh with Linux/Windows agents.
  • Engineered custom Sigma rules to detect suspicious login activity.
  • Built Kibana dashboards for real-time threat visualization.

🧭 Project: SOC Operations (Use-Cases & Playbooks)

Objective: Operational Detection & Response

  • Authored triage/runbooks for phishing, brute-force, malware, and lateral movement.
  • Created Splunk correlation searches; mapped detections to MITRE ATT&CK.
  • Drove MTTD/MTTR reduction by tuning noise and enriching alerts with context.

πŸ›‘οΈ Project: SOAR & EDR Integration (SOAR Lab)

Objective: Automated Incident Response

  • Integrated TheHive, Cortex, and Velociraptor.
  • Designed automation for alert enrichment, file-hash lookups, and IOC pivoting.

⚠️ Project: LLM Vulnerability Research

Objective: Offensive AI Testing

  • Publication: Presented at IEEE International Conference (2025).
  • Analyzed and exploited security flaws in Large Language Models.

πŸ”Ž Project: Safecode-Scanner

Objective: Static Analysis Tool

  • Developed a Python-based scanner to detect hardcoded credentials and secrets.

🐝 Project: Cowrie Honeypot

Objective: Threat Intelligence

  • Deployed SSH honeypot to capture unauthorized login attempts and TTPs.
  • Scripted real-time Slack alerts for attacker behavior and IOC collection.

πŸ“ Latest Writeups


End of transmission.
LinkedIn | GitHub | Email