Skip to content
View Bharathkasyap's full-sized avatar
πŸ’­
Cybersecurity Analyst | Threat Detection & Response | Risk Mitigation
πŸ’­
Cybersecurity Analyst | Threat Detection & Response | Risk Mitigation
  • Log(N) Pacific
  • Remote

Block or report Bharathkasyap

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Bharathkasyap/README.md

Cybersecurity Analyst | CYSA+ | Security+ Certified | Splunk Core Certified Power User | ISC2 CC | Google Certified | @ Log(N) Pacific


πŸ‘¨β€πŸ’» About Me

  • πŸ” Cybersecurity analyst with hands-on expertise in threat hunting, SIEM detections, KQL scripting, and automated vulnerability remediation
  • βš™οΈ Knowledge on PowerShell & BASH security hardening tools aligned with STIG & CVE benchmarks
  • πŸ“ˆ Proven ability to simulate and detect real-world threats using Microsoft Sentinel and MITRE ATT&CK framework
  • 🎯 Seeking roles in SOC Operations, Threat Detection, Vulnerability Management, or Blue Team Automation
  • πŸŽ“ Master’s in Cybersecurity Candidate @ WGU
    • πŸ” Key Focus Areas:
    • Secure Network Design
    • Security Operations (SIEM | Incident Response)
    • Penetration Testing & Vulnerability Assessment
    • Cloud Security
    • Risk Management & Security Architecture
  • πŸ† Industry Certifications: PenTest+ | CISM | CISSP | (in progress) πŸ†
  • πŸ›‘οΈ Passionate about architecting secure systems, ethical hacking, and implementing modern defense strategies in real-world scenarios.

πŸ”₯ Career Highlights

  • πŸ“Š Microsoft Sentinel Engineering: Developed custom detection rule packs for brute-force, C2, persistence tactics
  • πŸ›‘ Vulnerability Management Lead (Lab Sim): Created a structured remediation workflow using PowerShell
  • πŸ•΅οΈβ€β™‚οΈ Threat Hunting: Investigated anomalies in Tor browser traffic, RDP brute force attempts, and internal abuse cases
  • πŸ“˜ Incident Response Playbooks: Authored step-by-step guides to reduce analyst guesswork and accelerate triage


πŸ’Ό Expertise Projects

βœ… Vulnerability Management

🚨 Threat Hunting + Detection Engineering


πŸ† Competitions & Events

  • 🧠 CTF: The Great Admin Heist

    Participated in a real-world scenario-based Capture The Flag (CTF) focused on privilege escalation, enumeration, and log analysis.
    Demonstrated strong analytical skills by identifying initial access vectors, misconfigured admin settings, and exploiting hidden credentials.

    Tools used: Browser-based reconnaissance, log forensics, Azure Sentinel, KQL Queries.

    Outcome: Successfully captured all flags and documented each step with detailed reasoning and remediation suggestions.

  • πŸ•΅οΈ Threat Hunt: Operation Deep Access

    Conducted a structured threat hunt simulating advanced persistent threats (APT) using Microsoft Defender for Endpoint and Sentinel. Identified stealthy attacker behaviors including PowerShell-based persistence, WMI event triggers, credential dumping, lateral movement, and C2 communication.

    Tools used: Microsoft Sentinel, Defender for Endpoint (MDE), KQL Queries, Event Log Analysis, Azure VM.

    Outcome: Mapped attacker activity to MITRE ATT&CK framework, generated forensic timeline, and proposed a detailed incident response plan with containment, eradication, and hardening strategies. Delivered a complete GitHub markdown report with TTP analysis and recommendations.


🧩 Project Summary

Area Tools / Skills Used Key Outcome
Vulnerability Remediation PowerShell, BASH, STIG, CVE, Compliance Hardened OS + Automated Patch Scripts
Threat Detection Microsoft Sentinel, KQL, MDE Detected Brute Force, RDP, C2 Scenarios
Security Automation YAML Rules, Playbooks, Incident Mapping Enabled Low-Latency SOC Responses
Blue Team Engineering MITRE ATT&CK, KQL Dashboards Built Resilient Analyst View Layers

πŸ“š Learning & Certifications

  • βœ… CompTIA CYSA+
  • βœ… CompTIA Security+
  • βœ… ISC2 CC
  • βœ… Google Cybersecurity Professional Certificate
  • βœ… Splunk Certified Core Power User
  • πŸ›‘ SIEM Tuning, Blue Team Automation, IR Playbooks
  • 🧠 Regular lab practice in offensive/defensive strategy simulation

πŸš€ Active Deployments


πŸ›οΈ Knowledge Builds


πŸ› οΈ Tools & Technologies

AWS Splunk


πŸ“« Connect With Me


πŸ˜„ Fun Fact

Why does the blue team always bring snacks to SIEM meetings? Because with all those logs, someone's gotta serve the cookies, and analyze who stole them.


Β© 2025 Venkata Devulapalli β€” Cybersecurity in Action.

Pinned Loading

  1. A_Targeted_Vulnerability_Assessment_for_E-commerce_Operations A_Targeted_Vulnerability_Assessment_for_E-commerce_Operations Public

    Vulnerability Assessment Notes

  2. Incident_Response_For_Everyone Incident_Response_For_Everyone Public

    Incident_Response

  3. NIST_FrameWorks NIST_FrameWorks Public

    NIST Frameworks

  4. PASTA_Threat_Model_Worksheet PASTA_Threat_Model_Worksheet Public

    Process of Attack Simulation and Threat Analysis (PASTA) Threat Model Worksheet

  5. programmatic-vulnerability-remediations-Bharath programmatic-vulnerability-remediations-Bharath Public

    programmatic-vulnerability-remediations

    PowerShell

  6. sentinel-detection-rules-Bharath sentinel-detection-rules-Bharath Public

    Microsoft Sentinel Detection Rules