Cybersecurity background

Focused on threat detection, incident analysis, and SIEM monitoring, with hands-on experience in security labs and real-world investigations.

πŸš€ View Projects

πŸ‘€ About Me

Nirakara Mishra, Cybersecurity Analyst profile photo

Cybersecurity Analyst πŸ” | B.Tech CSE πŸ’»
Google β€’ IBM β€’ Cisco Certified πŸ›‘οΈ

I am a Cybersecurity Analyst with a strong foundation in protecting systems, networks, and digital assets from modern cyber threats. I hold a B.Tech in Computer Science and Engineering and professional certifications from Google, IBM, and Cisco, where I developed practical knowledge of modern cybersecurity practices and defensive strategies.

I have gained practical experience through security labs and platforms such as TryHackMe, working with tools and techniques used in SOC operations, threat analysis, log investigation, and vulnerability assessment.

  • πŸ” SOC Operations & Incident Response
  • πŸ›‘οΈ Threat Analysis & Vulnerability Management
  • 🌐 Network & System Security
  • πŸ“Š Security Monitoring, SIEM & Log Analysis, Risk Assessment

I am actively seeking opportunities as a SOC Analyst, Cybersecurity Analyst, or Threat & Vulnerability Management Professional, where I can contribute to strengthening security postures and responding to incidents effectively.

Beyond technical expertise, I bring strong analytical thinking, attention to detail, and collaborative teamwork. I continuously stay updated with emerging threats and defensive strategies to remain effective in an evolving cybersecurity landscape.

πŸ“„ Download Resume

πŸ› οΈ Technical Skills

Security Operations

  • Incident Response
  • SOC Alert Triage
  • Log Analysis
  • Threat Detection
  • Threat Intelligence
  • Vulnerability Assessment

Security Tools

  • Splunk (SIEM Fundamentals)
  • Wireshark
  • Nmap
  • Burp Suite
  • CyberChef

Programming & Scripting

  • Python
  • Bash
  • SQL

Networking & Systems

  • Linux
  • TCP/IP
  • Network Security Fundamentals
  • Access Control

Frameworks & Standards

  • NIST Cybersecurity Framework
  • MITRE ATT&CK
  • OWASP Top 10
  • ISO 27001 (Awareness)

Professional & Analytical Skills

  • Analytical Thinking
  • Attention to Detail
  • Problem Solving
  • Security Documentation
  • Communication
  • Team Collaboration

πŸ§ͺ Projects

πŸ›‘οΈ Advanced Intrusion Detection & Prevention System (IDPS)

Detects and classifies malicious network traffic to simulate real-world SOC alert generation and threat monitoring.

πŸ› οΈ Tools: Python, Flask, Pandas, Scikit-learn, Joblib, Matplotlib
πŸ” Concepts: Threat Detection, Log Analysis, ML-based Classification

✨ Key Features

  • Simulates SOC alert generation and attack classification workflow
  • Detects DoS, Probe, R2L, and U2R attacks using trained ML model
  • Uploads CSVs and visualizes attack types via pie chart
  • Built-in Log Viewer with Export-to-Excel functionality

Impact: Simulates SOC alert detection

πŸ•ΈοΈ Advanced Web Application Security Scanner

Scans web applications for common vulnerabilities like SQL Injection, XSS, and insecure headers using static and dynamic techniques.

πŸ› οΈ Tools: Python, Flask, Requests, BeautifulSoup, Pandas, OpenPyXL
πŸ” Concepts: Web Security, Vulnerability Assessment, OWASP Top 10

✨ Key Features

  • Helps identify web vulnerabilities during security assessment workflows
  • Supports both CLI and Web UI
  • Scans user-provided URLs for security issues
  • Logs vulnerabilities with timestamps and IP addresses
  • Includes Dashboard with filtering and Excel export options

Impact: Helps identify web vulnerabilities

βš™οΈ IP Allowlist Security Automation (Python)

Developed a Python-based security automation script to manage IP allowlists by removing unauthorized addresses, helping enforce access control and least-privilege principles in SOC environments.

πŸ› οΈ Tools: Python, Security Automation, IP Allowlisting
πŸ” Concepts: Access Control, Security Automation, Network Security

✨ Key Features

  • Simulates access control enforcement used in SOC environments
  • Automated removal of unauthorized IP addresses
  • Reduced manual errors in access control management
  • Applied least-privilege through scripted enforcement

Impact: Automates IP-based access control

πŸ§ͺ Labs & Practical Experience

Advent of Cyber 2025 – TryHackMe

Completed TryHackMe’s 24-day Advent of Cyber challenge featuring realistic Blue Team and SOC investigation scenarios focused on threat detection, incident analysis, and defensive security workflows.

Key Skills Practiced

  • SOC Alert Triage
  • Web Log Analysis
  • Malware Analysis
  • Phishing Detection
  • YARA Rule Investigation
  • Network Discovery
  • Splunk Basics
  • Linux CLI Investigation

TryHackMe Practical Labs

Practiced multiple cybersecurity labs covering network analysis, web application security testing, and threat investigation techniques through interactive security exercises.

Key Skills Practiced

  • Network Traffic Analysis
  • Web Application Security Testing
  • Linux Security Tasks
  • Threat Investigation
  • Enumeration Techniques
  • Log Analysis

πŸŽ“ Certifications

Google Cybersecurity Professional Certificate

Google β€’ Coursera β€’ 2024


Focused on SOC operations, threat detection, and incident response, with hands-on experience in SIEM monitoring, log analysis, and security investigation using Linux, Python, and SQL.

IBM Cybersecurity Analyst Professional Certificate

IBM β€’ Coursera β€’ 2025


Focused on threat monitoring, vulnerability assessment, and incident response, with hands-on experience using SIEM tools, penetration testing techniques, and digital forensics across enterprise environments.

Cisco Cyber Threat Management

Cisco Networking Academy β€’ 2025


Focused on cyber threat management, vulnerability assessment, and incident response, with hands-on understanding of threat intelligence, risk management, digital forensics, and network security analysis.

Cisco Network Defense

Cisco Networking Academy β€’ 2025


Focused on network defense and security monitoring, covering firewall technologies, access control, cloud security, and cryptographic techniques to detect threats and protect enterprise networks.

πŸ› οΈ Security Capabilities

πŸ” Vulnerability Analysis

Identify common vulnerabilities in web applications and systems using tools like Nmap, Nessus, and Burp Suite.

πŸ“Š Security Monitoring

Analyze logs and network traffic to detect suspicious activity and potential security threats.

πŸ›‘οΈ Incident Analysis

Understand and investigate security incidents through log analysis and basic incident response techniques.

🌐 Web Security Testing

Test applications for OWASP Top 10 vulnerabilities such as SQL Injection and Cross-Site Scripting.

🐧 Linux Security

Work with Linux systems to monitor activity, manage permissions, and perform basic system hardening.

βš™οΈ Security Automation

Develop Python-based tools to automate security tasks such as scanning, logging, and threat detection.

πŸ† Achievements

🧠 Winner – Cybersecurity Hackathon

Secured 1st place in a Capture the Flag (CTF) competition focused on real-world exploitation and defense techniques.

Organization: BPUT | Year: 2024

πŸš† Selected Participant – Jagriti Yatra

Selected for a national leadership journey focused on innovation, entrepreneurship, and teamwork across India.

Organization: Jagriti Sewa Sansthan | Year: 2025

πŸ” Completed Hands-on Cybersecurity Labs

Successfully completed multiple practical labs focused on network analysis, vulnerability assessment, and attack detection using platforms like TryHackMe.

πŸŽ“ Education

B.Tech in Computer Science & Engineering

University: Biju Patnaik University of Technology, Odisha

Duration: 2022 – 2025

CGPA: 8.2 / 10

Focused on cybersecurity, network protection, and secure system design. Built strong foundations in operating systems, cryptography, and web security.

Relevant Coursework:

  • Network Security
  • Cryptography
  • Web Application Security
  • Operating Systems
  • Ethical Hacking
  • Risk Management

πŸ“¬ Contact Me

If you're interested in opportunities, collaborations, or have any questions, feel free to get in touch!

πŸ“ Based in Odisha, India β€’ Open to Remote Opportunities