Skip to content
View Aaniket09's full-sized avatar

Block or report Aaniket09

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Aaniket09/README.md

Aniket Agarwal's IT and Cybersecurity Portfolio 🔐

__        __  _                        
\ \      / /__| | ___ ___  _ __ ___   ___  
 \ \ /\ / / _ \ |/ __/ _ \| '_ ` _ \ / _ \ 
  \ V  V /  __/ | (_| (_) | | | | | |  __/ 
   \_/\_/ \___|_|\___\___/|_| |_| |_|\___| 
   to Aniket's Console - v1.0

aniket@cybersec:~$ whoami
> Security Operations Engineer passionate about Linux internals, cloud security, and automation.
  I specialize in building custom defense tools, patching open-source infrastructure, 
  and engineering AI-driven SOC workflows.

aniket@cybersec:~$ ./pronouns.txt
> he/him

aniket@cybersec:~$ ./certifications.txt
> [✓] Microsoft Certified: Security Operations Analyst (SC-200)
> [✓] CompTIA Security+ (SY0-701)
> [✓] ISC² Certified in Cybersecurity (CC)

aniket@cybersec:~$ ./stack.txt
> SIEM: Microsoft Sentinel, Splunk, Defender XDR
> IDS/IPS: Snort, Suricata, Wireshark
> Cloud: Azure, OpenStack, Ubuntu Linux
> Code: Python (Scapy/Pandas), PowerShell, KQL, Bash

aniket@cybersec:~$ ./askMeAbout.txt
> Threat Hunting 🕵️ | SOAR Automation ⚡ | Linux Hardening 🐧 | Incident Response 🚨

⚠️ Vulnerability Management & Cloud Security

🚨 Threat Detection & Automation

  • AI SOC Agent for Azure Sentinel

    Architected a custom SOAR pipeline using OpenAI APIs to auto-analyze Sentinel alerts, reducing manual triage latency by 70%.

  • Threat Hunt: Ghost Support Session

    Investigated a "Ghost Support" intrusion scenario using Azure Sentinel. Engineered KQL queries to map the full kill chain, identifying PowerShell-based persistence, defense evasion artifacts, and data exfiltration staging.

  • DLL Injection Threat Detection Automation

    Developed a Python script to identify DLL injection techniques (MITRE T1055.001), achieving 80% detection accuracy and improving incident triage efficiency.

📝 Technical Writing

🤳 Connect With Me

Pinned Loading

  1. AI-SOC-Agent AI-SOC-Agent Public

    A modular AI-powered CLI for Azure Sentinel threat hunting & remediation. Features strict guardrails, cost-aware routing, and automated SOAR workflows (VM isolation, rule creation).

    Python 5 3

  2. Threat-Hunt-Nov-2025-Cyber-Range Threat-Hunt-Nov-2025-Cyber-Range Public

  3. STIGS-Implementation-Automation STIGS-Implementation-Automation Public

    PowerShell

  4. DLL-detection-using-python-and-ghidra DLL-detection-using-python-and-ghidra Public

    Python

  5. Openstack_Snort Openstack_Snort Public

  6. risk-analysis-for-5G-infrastructure-in-tsunami-prone-areas risk-analysis-for-5G-infrastructure-in-tsunami-prone-areas Public