Skip to content
View thearjunl's full-sized avatar

Highlights

  • Pro

Block or report thearjunl

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
thearjunl/README.md

SOC Analyst Β· Security Researcher Β· Builder of AI-Powered Security Tools

LinkedIn TryHackMe LeetCode Email Open to Work


whoami

I'm an Integrated MCA graduate from Kerala, India, specialising in cybersecurity and secure application development. I don't just study security β€” I build tools that automate the boring parts of it.

My work sits at the intersection of AI and defensive security: SOC automation, IAM governance, penetration testing frameworks. If something can be done with a local LLM and a Python script, I'll build it.

Currently hunting for SOC Analyst / Security Analyst roles in India. CEH v13 in progress. Active on TryHackMe.


πŸ” Projects

These are the ones worth looking at. Each one solves a real problem.


KAALI β€” AI-Powered SOC Alert Correlation & Investigation Assistant

Python FastAPI Elasticsearch Gemini React

KAALI simulates a real SOC workflow end-to-end. It ingests raw security logs (Linux auth.log, Suricata IDS), detects anomalies like brute-force attempts, correlates multi-stage events into incidents, enriches them with threat intel from AbuseIPDB and VirusTotal, then calls Google Gemini to act as a senior analyst β€” generating MITRE ATT&CK-mapped summaries and remediation steps. A React dashboard surfaces everything for human review.

What it actually does:

  • Parses and indexes real security logs into Elasticsearch in real-time
  • Detects brute-force, lateral movement, and account compromise patterns
  • Correlates individual alerts into incident chains (e.g. failed logins β†’ successful login = Account Compromise)
  • Generates executive-grade AI incident reports with ATT&CK mapping
  • Auto-blocks attacker IPs via iptables on critical incidents

Ghost-Protocol β€” Autonomous NHI Auditor for AWS IAM

Python AWS Ollama Athena

Enterprises run thousands of IAM roles consumed by services, not humans. These Non-Human Identities are almost always over-provisioned β€” they carry wildcard permissions but use a handful of API calls. Ghost-Protocol closes that gap.

What it actually does:

  • Discovers every NHI role (EC2, Lambda, etc.) across your AWS account
  • Correlates allowed permissions against real CloudTrail usage over 30 days via Athena
  • Sends the delta to a local LLM (Ollama/Llama 3) which generates a scoped least-privilege replacement policy
  • Quarantines high-risk identities immediately with a non-destructive Deny-All permissions boundary β€” no accidental deletions

Cloud security + AI + zero dependency on third-party LLM APIs. Everything runs locally.


KUROKAMI β€” AI-Driven Penetration Testing Framework

Python Docker Ollama FAISS PostgreSQL Kubernetes

Production-grade pen testing framework with LLM-powered module orchestration. Not a script wrapper β€” a full agentic loop that plans, executes, and reasons about findings.

What makes it different:

  • AI orchestration: the LLM selects and sequences k_* modules based on target context, not a static scan order
  • FAISS vector index for retrieval-augmented analysis β€” findings from past sessions inform current reasoning
  • Complete audit trail: every action, finding, reasoning chain stored in SQLite/PostgreSQL
  • Multi-format reports: JSON, HTML, PDF
  • Production hardened: rate limiting, input validation, Fernet encryption, JWT auth, 70%+ test coverage
  • Docker + Kubernetes manifests included

πŸ… Certifications & Training

Credential Issuer Status
CEH v13 β€” Certified Ethical Hacker EC-Council πŸ”΅ In Progress
ISO/IEC 27001:2022 Lead Auditor PECB βœ… Completed
Cyber Threat Intelligence β€” CTIGA / CTI 101 arcX βœ… Completed
ISEA Β· CSEDP Govt. of India βœ… Completed
Google Cybersecurity Specialization Google / Coursera βœ… Completed
Oracle Cloud Infrastructure Generative AI Oracle βœ… Completed
TryHackMe β€” SOC Level 1 Path TryHackMe βœ… Active

πŸ’Ό Experience

Security Analyst Intern β€” Red Team Hacker Academy (VAPT, vulnerability assessment, security tooling)

Software Developer Intern β€” Zoople Technologies (full-stack development, React, Node.js)


🧰 Core Stack

Security      β†’  Wireshark Β· Nmap Β· Burp Suite Β· Metasploit Β· SIEM tools Β· MITRE ATT&CK
Cloud         β†’  AWS (IAM, CloudTrail, Lambda, Athena) Β· Oracle Cloud
Languages     β†’  Python Β· JavaScript Β· TypeScript Β· Java
Web           β†’  React Β· Next.js Β· FastAPI Β· Node.js Β· PostgreSQL Β· Supabase
AI / ML       β†’  Ollama Β· Gemini API Β· FAISS Β· LangChain-style RAG
OS            β†’  Linux (primary) Β· Windows

πŸ“Š GitHub Stats

GitHub Stats

GitHub Streak

Top Languages



πŸ”­ Currently Working On

  • KAALI β€” adding automated SIEM-style dashboards and multi-source log correlation
  • Ghost-Protocol β€” multi-account AWS support and Terraform policy export
  • CEH v13 practical labs and exam prep
  • Actively applying for SOC Analyst / Security Analyst roles across India

πŸ“¬ Let's Talk

If you're hiring for SOC / Security Analyst roles or want to collaborate on security tooling β€” reach out.


contribution graph

Profile Views

Pinned Loading

  1. Nizhal Nizhal Public

    A stealthy, high-performance security extension that acts as a protective shadow.

    Python 2

  2. NirikshaX NirikshaX Public

    NirikshaX β€” Python-based Digital Forensic Recovery & Investigation Toolkit for filesystem analysis, artifact extraction, suspicious file detection, and structured DFIR reporting.

    Python

  3. Kaali Kaali Public

    KAALI – AI Powered SOC Alert Correlation & Investigation Assistant. KAALI analyzes security logs, detects suspicious activity, correlates alerts, integrates threat intelligence, and uses AI to expl…

    Python

  4. Ghost-Protocol Ghost-Protocol Public

    An Autonomous Non-Human Identity (NHI) Auditor and Governance tool. Uses Agentic AI (Ollama/Llama 3) to analyze AWS IAM & CloudTrail logs for real-time "Least Privilege" enforcement.

    Python

  5. SkyShield SkyShield Public

    SkyShield is an open-source CSPM tool for AWS and Azure. It scans for misconfigurations, stores results locally, generates HTML reports, sends real-time alerts, and supports auto-remediation of cri…

    Python