Skip to content
View shamanthwick's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report shamanthwick

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
shamanthwick/README.md
header

Typing SVG

LinkedIn Email GitHub Profile Views

Profile

Cybersecurity analyst with hands-on experience in offensive security, vulnerability assessment, SecOps, threat hunting, incident response, and AI-assisted automation. I focus on practical security engineering: validating weaknesses, improving detection coverage, and building workflows that reduce analyst effort while producing measurable results.

operator_profile = {
  current_role: "Cyber Security Analyst @ Thincnext",
  focus: ["Penetration Testing", "SecOps", "Threat Hunting", "AI Automation"],
  building_with: ["Python", "Flask", "Scapy", "Splunk", "QRadar", "OSINT"],
  mission: "Make security work more practical, measurable, and repeatable"
}

Impact Snapshot

Area Outcome
Detection Improved detection rates by 15% through hands-on validation and offensive testing
Automation Reduced assessment time by 60% using OSINT and AI-driven workflows
Efficiency Improved operational efficiency by 30% by reducing repetitive analyst overhead
Training Designed and delivered training for 50+ participants
Practical Learning Built CTF-style exercises with 97% positive feedback

Experience

Cyber Security Analyst, Thincnext

  • Performed hands-on vulnerability assessment and offensive validation to expose real weaknesses before attackers do.
  • Applied OSINT and AI-assisted automation to accelerate assessment workflows and improve analyst throughput.
  • Designed training paths and practical lab exercises to strengthen hands-on cybersecurity learning.

Cyber Security Professional, Hacker School

  • Performed full-scope penetration testing across web applications, networks, and operating systems.
  • Used Splunk and QRadar for threat hunting and incident response workflows.
  • Worked across wireless security, IoT security, malware assessment, and offensive tradecraft.

SOC Analyst Trainee, Ashtaksha Lab

  • Built experience in Splunk-driven analysis, detection thinking, and secure network operations.
  • Strengthened defensive understanding across DLP, encryption, PII/PHI handling, and security fundamentals.

Arsenal

Core Skills

Cybersecurity Tools

Burp Suite Nessus Metasploit Wireshark Splunk

Security Concepts

MITRE ATT&CK Cyber Kill Chain OSINT Cryptography

Featured Project

IDS With AI

Current Highlight: IDS-With-AI

  • AI-driven intrusion detection system using the UNSW-NB15 dataset
  • Built with Python, Scapy, Flask, SQLite, and Random Forest
  • Designed for real-time packet inspection, alerting, and practical threat visibility
  • Aligns directly with my interest in detection engineering, network defense, and applied ML

Certifications And Learning

  • Certified Ethical Hacker (CEH)
  • Cyber Security Professionals (CSP)
  • IBM Cybersecurity Foundation Course
  • PG Certificate in AI/GenAI Powered Cybersecurity from IIT Roorkee
  • BCA from Seshadripuram College, CGPA 8.2

Highlights

  • CTF Winner at NITK Surathkal in March 2025
  • Conducted a cybersecurity workshop for 30+ engineering students in April 2025
  • Completed 5+ advanced ethical hacking modules through workshops at IISc Bengaluru

GitHub Analytics

GitHub stats GitHub streak
Top languages

Connect

Security is strongest when it is practical, measurable, and continuously improved.

Popular repositories Loading

  1. flight-fare-prediction flight-fare-prediction Public

    Forked from Aman-Preet-Singh-Gulati/flight-fare-prediction

    Jupyter Notebook

  2. IDS-With-AI IDS-With-AI Public

    AI-Driven Intrusion Detection System using ML (Random Forest) with UNSW-NB15 dataset

    HTML

  3. shamanthwick shamanthwick Public

    Python

  4. tamarin-rule-generator tamarin-rule-generator Public

    AI-powered tool that converts protocol diagrams (PNG, PDF) into formal Tamarin verification models. Task 1 submission for IIT Roorkee Formal Verification course.

    Python

  5. pqc-tls-1.3 pqc-tls-1.3 Public

    Post-Quantum TLS 1.3 implementation with NIST PQC standards (ML-KEM-768 + ML-DSA-65). Performance evaluation and comparison with classical TLS. Task 2 submission for IIT Roorkee Formal Verification…

    Python

  6. neuro-aes-chacha neuro-aes-chacha Public

    NeuroCrypto: Deep neural network-based implementations of AES-128 and ChaCha20 cryptographic algorithms. Reproduces SAC 2025 research results with 100% S-box accuracy. IIT Roorkee - Formal Verifica…

    Python