Cybersecurity analyst with hands-on experience in offensive security, vulnerability assessment, SecOps, threat hunting, incident response, and AI-assisted automation. I focus on practical security engineering: validating weaknesses, improving detection coverage, and building workflows that reduce analyst effort while producing measurable results.
operator_profile = {
current_role: "Cyber Security Analyst @ Thincnext",
focus: ["Penetration Testing", "SecOps", "Threat Hunting", "AI Automation"],
building_with: ["Python", "Flask", "Scapy", "Splunk", "QRadar", "OSINT"],
mission: "Make security work more practical, measurable, and repeatable"
}
| Area | Outcome |
|---|---|
| Detection | Improved detection rates by 15% through hands-on validation and offensive testing |
| Automation | Reduced assessment time by 60% using OSINT and AI-driven workflows |
| Efficiency | Improved operational efficiency by 30% by reducing repetitive analyst overhead |
| Training | Designed and delivered training for 50+ participants |
| Practical Learning | Built CTF-style exercises with 97% positive feedback |
- Performed hands-on vulnerability assessment and offensive validation to expose real weaknesses before attackers do.
- Applied OSINT and AI-assisted automation to accelerate assessment workflows and improve analyst throughput.
- Designed training paths and practical lab exercises to strengthen hands-on cybersecurity learning.
- Performed full-scope penetration testing across web applications, networks, and operating systems.
- Used
SplunkandQRadarfor threat hunting and incident response workflows. - Worked across wireless security, IoT security, malware assessment, and offensive tradecraft.
- Built experience in Splunk-driven analysis, detection thinking, and secure network operations.
- Strengthened defensive understanding across DLP, encryption, PII/PHI handling, and security fundamentals.
- AI-driven intrusion detection system using the
UNSW-NB15dataset - Built with
Python,Scapy,Flask,SQLite, andRandom Forest - Designed for real-time packet inspection, alerting, and practical threat visibility
- Aligns directly with my interest in detection engineering, network defense, and applied ML
Certified Ethical Hacker (CEH)Cyber Security Professionals (CSP)IBM Cybersecurity Foundation CoursePG Certificate in AI/GenAI Powered CybersecurityfromIIT RoorkeeBCAfromSeshadripuram College,CGPA 8.2
CTF WinneratNITK Surathkalin March 2025- Conducted a cybersecurity workshop for
30+engineering students in April 2025 - Completed
5+advanced ethical hacking modules through workshops atIISc Bengaluru
- GitHub: github.com/shamanthwick
- LinkedIn: linkedin.com/in/shamanth-r-2h0c2ooc
- Email: shamantrsingh@gmail.com
Security is strongest when it is practical, measurable, and continuously improved.