root@kali:~# ×
Type 'help' for commands or 'info' for quick stats
$ _

Neeraj Sihag

neerajsihag@matrix v2.0 • 2025
SOC Analyst L1 · Blue/Red · Detection & Emulation
$ About

I specialize in AI automation, Linux, and all aspects of cybersecurity — Red Teaming, Blue Teaming, Digital Forensics, and building security tools. Passionate about threat detection, adversary emulation, and creating automated security solutions.

Red Team (Offensive)
  • External & Internal Penetration Testing: Nessus, Metasploit, manual exploitation frameworks
  • Advanced Web Application Testing: Burp Suite, OWASP Top 10 exploitation techniques
  • Active Directory Attack Simulation: Kerberoasting, Pass-the-Hash, lateral movement, privilege escalation
  • Password Cracking & Credential Attacks: Hydra, Hashcat, John the Ripper, wordlist optimization
  • Social Engineering & Phishing Campaign Design: SET, Gophish, pretexting techniques
  • Post-Exploitation & Persistence: C2 setup (Cobalt Strike, Metasploit), data exfiltration, backdoor deployment
🛡 Blue Team (Defensive)
  • SIEM Implementation & Optimization: IBM QRadar, Wazuh, Splunk, ELK Stack - log correlation, custom rules, alert tuning
  • EDR/XDR Solutions: Trend Micro Vision One, endpoint threat detection and response
  • Dark Web Threat Monitoring: Intelligence correlation, IoC extraction, threat actor tracking
  • DLP Policy Configuration: Data exfiltration prevention, sensitive data monitoring
  • Network Threat Detection: Suricata IDS/IPS, Zeek, network forensics, packet analysis
  • Incident Response: SOC playbook execution, IoC triage, malware analysis, forensic investigation
  • Threat Hunting: APT behavior detection using MITRE ATT&CK framework, proactive threat discovery
💼 Experience
SOC Analyst L1
eSec Forte Technologies
October 2025 – Present

Advanced SIEM operations with IBM QRadar and Trend Micro. Leading alert investigation, incident response coordination, threat hunting operations, and SOC process improvements. Managing security monitoring across multiple client environments.

SOC Analyst Intern
eSec Forte Technologies
August 2025 – September 2025

SIEM alert triage and analysis using IBM QRadar. Incident detection, false positive validation, DLP monitoring, and dark web threat intelligence gathering. Assisted in security investigations and playbook execution.

Cyber Security Intern
Gurugram Police
June 2025

Digital forensics, evidence analysis, and red team operations. Conducted vulnerability assessments, assisted in incident investigations, and supported law enforcement cybercrime initiatives.

🏆 Certifications
CompTIA A+
ISC2 Certified in Cybersecurity (CC)
IBM QRadar
Trend Micro Certified
and more...
🎓 Education
Bachelor of Technology (B.Tech) — Computer Science (CSE)
Chaudhary Devi Lal University (CDLU), Haryana
2022–2025
Skills
Offensive Security

Penetration Testing, Vulnerability Assessment, Exploitation, Web App Security, Network Attacks, OSINT

Defensive Security

SIEM (IBM QRadar, Wazuh, Splunk), EDR/XDR (Trend Micro), Threat Hunting, IDS/IPS (Suricata), Malware Analysis, Threat Intelligence, Incident Response

Tools & Technologies

Metasploit, Burp Suite, Wireshark, Nmap, Hashcat, Python, Bash, Linux, Windows, Active Directory

📧 Contact
$ resume --download