Available for SOC & Cloud Security roles

Defending the digital perimeter, one log at a time.

> |

I specialize in defending modern digital infrastructures through threat monitoring, cloud security, vulnerability management, and compliance-driven security operations.

1+
Year of Learning
10+
Tools mastered
4+
Frameworks
Lokesh Kaushik portrait
id://lk_07SECURE
// about

The mind behind the monitor

I'm a cybersecurity enthusiast specializing in defending modern digital landscapes. From analyzing traffic in a SOC environment to securing cloud infrastructure and aligning systems with GRC frameworks, I enjoy solving complex security challenges.

My approach blends an analytical mindset with hands-on tooling — I study the anatomy of every alert, instrument what can be measured, and treat compliance as code, not paperwork. Continuous learning is the only real perimeter that lasts.

LOCATION
Chandigarh, IN
FOCUS
SOC · Cloud · GRC
STATUS
Active learner
Threat Analysis & Detection
Cloud Security
Governance, Risk & Compliance
Security Monitoring
Security Automation
Vulnerability Management
// education

A timeline of curiosity

B.E. Computer Science & Engineering

Expected Graduation · 2027

2023 — 2027

Foundational coursework across systems, networks, and software engineering, with self-directed deep dives into security architecture and operations.

Cybersecurity Specialization

Self-directed track

Last 12 months

Hands-on work in SIEM analysis, cloud security posture, GRC tooling, and offensive web security — turning theory into deployable skill.

// skills

Tooling, in production

A working stack across detection, cloud, compliance, and automation.

Security Operations & Threat Analytics

  • Splunk (SIEM)82%
  • Nessus75%
  • Wireshark78%

Application & Cloud Security

  • Burp Suite72%
  • AWS Security Hub70%
  • Microsoft Defender for Cloud68%

Governance, Risk & Compliance

  • ServiceNow GRC70%
  • RSA Archer65%
  • AuditBoard62%

Compliance Automation

  • Drata68%
  • Vanta66%
  • Notion / Excel88%

Frameworks & Standards

  • NIST CSF80%
  • ISO/IEC 2700178%
  • SOC 2 · PCI-DSS72%

Automation & Scripting

  • Python80%
  • Bash Scripting75%
  • Linux / Unix CLI82%
// services

What I can defend for you

SOC Log Monitoring

Continuous review of security events across endpoints, network, and cloud sources.

operational

Threat Detection & Analysis

Triage suspicious activity, enrich indicators, and surface actionable detections.

operational

Vulnerability Assessment

Scan, prioritize, and report on weaknesses across infrastructure and applications.

operational

Cloud Security Monitoring

Posture management and runtime visibility on AWS and Azure workloads.

operational

Security Event Investigation

Deep-dive into incidents with packet captures, timelines, and root-cause analysis.

operational

Compliance-Oriented Practices

Align operations with NIST CSF, ISO 27001, SOC 2, and PCI-DSS expectations.

operational

Security Automation Scripts

Python and Bash tooling to eliminate repetitive triage and reporting work.

operational
// projects & research

Selected work

Project · 01

Email Phishing Analysis Tool

Python
phish-analyzer.py
$ python phish-analyzer.py invoice.eml
[+] Parsing headers · SPF=fail · DKIM=none
[+] Extracted 3 URLs · resolving against VirusTotal
[!] Malicious domain detected: secure-login.xyz
[✓] IOC report written to ./reports/2025-05.json
  • · Inspects email headers, URLs, and sender metadata
  • · Extracts indicators of compromise (IOCs)
  • · Verifies malicious domains/IPs via threat-intel APIs
Research · 02

A Lightweight Tool to Monitor Configuration File Changes

Best Paper
ISCCSC 2025 · Best Paper Abstract

A research-focused, lightweight monitoring solution that watches critical configuration files for unauthorized change — designed for low-resource environments where heavy FIM agents aren't viable.

Integrity
SHA-256
Footprint
< 8 MB
Alerts
Realtime
system-integrity · file-monitor · research
// experience

Hands-on security work

No formal title yet — but the muscle memory is real. Here's where I've been training.

SOC Monitoring Practice

SIEM · Detection

Hands-on log review using Splunk and open-source SIEM datasets; built detection logic for common attacker TTPs.

Cloud Security Experimentation

AWS · Azure

Configured AWS Security Hub and Microsoft Defender for Cloud across lab environments to study misconfiguration patterns.

Vulnerability Management

Nessus · CVSS

Authenticated and unauthenticated scans with Nessus, prioritization workflows, and remediation tracking.

Threat Analysis Simulations

Purple-team

Recreated phishing and lateral-movement scenarios in isolated labs to practice analyst response.

Academic Security Projects

Coursework

Security-focused course projects in cryptography, web app security, and network defense.

// frameworks

Standards I work with

The control libraries and frameworks shaping how I think about defense and compliance.

NIST CSF

Identify · Protect · Detect · Respond · Recover. Risk-based framework for measurable security maturity.

FrameworkIn practice

ISO/IEC 27001

Information security management systems — controls, risk treatment, and continuous improvement.

FrameworkIn practice

SOC 2

Trust services criteria covering security, availability, and confidentiality for SaaS providers.

FrameworkIn practice

PCI-DSS

Payment card data protection — segmentation, access control, monitoring, and secure development.

FrameworkIn practice
// contact

Let's connect

Open to SOC, cloud security, and GRC opportunities. I usually reply within a day.

Direct channels

Pick the one that works for you.