JIVAN KARTHEC B S

Cyber Security Student | Blue Team Operations

About Me

I am currently in my third year of pursuing a Bachelor's degree in Computer Science Engineering, specializing in Cyber Security at Saveetha Engineering College. My passion for cybersecurity was ignited during my early academic years, and I have since developed a keen interest in network security, threat analysis, and ethical hacking.

With a strong foundation in analytical thinking and problem-solving, I am committed to continuous learning in the rapidly evolving field of cybersecurity. I actively participate in workshops, seminars, and hands-on labs to enhance my knowledge and skills. My ultimate goal is to contribute effectively as a cybersecurity professional, particularly in a Security Operations Center (SOC) as a Tier 1 Analyst.

Education

Bachelor of Engineering in Computer Science Engineering

Specialization in Cyber Security

Institution: Saveetha Engineering College, Chennai, Tamil Nadu

Duration: 2022 - 2026

Currently pursuing a Bachelor's degree with a focus on Cyber Security. Engaged in coursework covering key areas such as network security, ethical hacking, digital forensics, and security risk management. Actively participating in hands-on labs and projects that reinforce theoretical knowledge.

Higher Secondary School

Institution: Vidhya Lakshmi Matriculation Higher Secondary School, Tamil Nadu

Duration: 2020 - 2022

Completed higher secondary education with a strong foundation in science and mathematics. Developed critical analytical skills and a passion for technology, leading to a career focus in cybersecurity.

Skills

SIEM Implementation

Experience in implementing Security Information and Event Management (SIEM) solutions for monitoring and analyzing security events.

Network Monitoring

Proficient in monitoring network traffic and detecting anomalies to identify potential security threats.

Security Automation

Skilled in using automation tools like Shuffle to streamline security operations and incident response processes.

Incident Response

Knowledgeable in planning and executing incident response strategies to mitigate security incidents effectively.

Area of Experience

Amazon Web Services

Proficient in leveraging AWS for cloud-based security solutions and infrastructure management.

LimaCharlie

Experienced in using LimaCharlie for security orchestration, automation, and incident response.

Wazuh

Skilled in implementing Wazuh for security monitoring, threat detection, and incident response.

Splunk

Experience in using Splunk for analyzing security data and monitoring events in real-time.

Languages

Tamil

Fluent in Tamil, enabling effective communication in diverse environments.

English

Proficient in English for professional communication and documentation.

Hands-On Experience

Lets Defend

Hands-on experience with Lets Defend for practical cybersecurity training and skill enhancement.

Blue Team Lab

Engaged in Blue Team Lab exercises to improve defensive security techniques.

Projects

SOC Automation

- Deployed a Windows 10 agent to send security events to Wazuh for real-time alerting and automated responses.

- Integrated Shuffle for orchestrating responsive actions and case management, enhancing the Security Operations Center's efficiency.

- Streamlined the alerting process by enriching Indicators of Compromise (IOCs) through OSINT enrichment, sending details to The Hive for case management.

- Automated analyst notifications and response actions via email to reduce response times.

Active Directory Lab

- Set up a security lab consisting of two servers (Splunk and Active Directory) and two computers (attacker and target machines).

- Connected all devices through a switch to the internet for real-time network analysis.

- Implemented data flow from the Active Directory server and target machine to the Splunk server using Universal Forwarders.

- Leveraged Sysmon for telemetry on the AD server and Atomic Red Team for generating test data on the target machine.

SOAR Endpoint Detection Response

- Implemented a Security Orchestration, Automation, and Response (SOAR) workflow using LimaCharlie for detecting malicious processes.

- Utilized Tines to automate threat response, including Slack and email alerts for user decision on machine isolation.

- Automated endpoint isolation via API integration, enhancing incident response by enabling real-time isolation of compromised machines based on user input.

Malware Analysis Lab

- Built a custom malware analysis lab using Windows 10 with Splunk and Sysmon to monitor and analyze suspicious file behavior within a segmented LAN environment.

- Integrated Kali Linux to create a controlled environment for testing malware samples.

- Focused on identifying behavioral patterns and potential indicators of compromise for threat intelligence purposes.