IT - Security

Anamay Mishra (Gh05tWa1ch)

Vigiliance in every packet

Cybersecurity Researcher skilled in SOC operations, Threat Hunting, Vulnerability Analyses, Malware Analysis, and Digital Forensics, exploring both Red and Blue team domains to strengthen digital defense.

My Favorite Deployments

Projects, tools and automation I like

Ongoing

AURA โ€“ Autonomous Unified Risk Auditor

AURA (Autonomous Unified Risk Auditor) is an AI-driven compliance monitoring system designed to autonomously evaluate, analyze, and enhance ISO 27001 controls.

n8nAutomationGRCComplianceGoogle Gemini LLMJavaScript
AURA โ€“ Autonomous Unified Risk Auditor
Ongoing

PHISHIFIED - Phishing Simulation Suite

A 360 Degree platform to organize and manage phishing campaigns to analyse employee awareness to phishing attacks.

PythonDjangoPhishing TrainingEmployee Awareness
PHISHIFIED - Phishing Simulation Suite
Archived

Silly Putty Malware Analyses

SillyPutty Malware Analysis involved conducting in-depth static and dynamic examination of the SillyPutty malware sample to understand its behavior, persistence mechanisms, and payload execution. The analysis focused on identifying its C2 communication, obfuscation techniques, and indicators of compromise, providing insights into how such loaders operate within Windows environments.

Malware AnalysesBehavioural AnalysesStatic AnalysesDynamic Analyses
Silly Putty Malware Analyses

HOME LABS

Detection-first playground

Practical SOC labs, attack simulations, and sandboxed malware analysis with executable threat-hunting and incident response playbooks โ€” from infection to containment.

Malware AnalysesEasy

Malware Analyses Lab Setup: FlareVM and Remnux

Create an isolated environment in Virtual Machine using FlareVM and Remnux.

2 HoursAnalyses Lab

FIRST OBJECTIVES

  • Build a safe, isolated malware analysis environment using FlareVM for dynamic analysis and REMnux for network and static analysis.
  • Analyze malware behavior through static, dynamic, and memory forensics techniques.
  • Capture and investigate system changes, network traffic, and IOCs generated during malware execution.

ACADEMIC JOURNEY

Education & Certifications

From physics foundations to cybersecurity expertise. My journey through academic excellence and professional certifications.

Undergraduate Degrees

๐Ÿ’ป
2021 - 2025

Bachelor of Technology- Computer Science & Engineering

Dr. APJ Abdul Kalam Technical University

Focused on core concepts of computing, programming, and cybersecurity.Developed strong foundations in data structures, algorithms, networking, and operating systems, along with hands-on experience in Python, web technologies, and security fundamentals. Gained exposure to software development, ethical hacking, and system analysis, building a problem-solving mindset essential for the cybersecurity field.

Mental Health Detection using AI Chatbot.:

  • โ–ธ The project aimed at researching about different ML models such as Random Forest and SVM for detecting mental health problems.

Secondary and Senior Secondary Education

๐Ÿ“–
2018 - 2019

Secondary Education (Class Xth)

Delhi Public School

Studied a broad curriculum including English, Hindi, Mathematics, Science, and Social Studies. Developed conceptual understanding across multiple disciplines and strengthened logical reasoning and communication skills.

๐Ÿ“–
2020-2021

Higher Secondary Education (Class XII)

Delhi Public School

Focused on core science subjects โ€” Physics, Chemistry, and Mathematics โ€” with additional emphasis on English and Physical Education.

Professional Certifications

๐ŸŒ

Certified Network Security Practitioner(CNSP)

The SecOps Group|2025

The exam tests knowledge in network security, covering key topics such as network protocols, security configurations in Linux and Windows, basic cryptography, the use of tools like Nmap and Wireshark for security analysis, security in Active Directory environments and social engineering attacks.

Google Cybersecurity Professional Certificate

Google|2023

Industry-leading certification in cybersecurity fundamentals, covering network security, threats, and vulnerabilities.

๐Ÿ”

SOC Level 1 Course Path

TryHackMe|2025

Hands-on learning path focused on SIEM monitoring, threat detection, and incident response with Cyber Threat Intelligence and DFIR. Built a strong foundation in Blue Team operations through practical, real-world security scenarios.

๐Ÿ”ต

C3SA Cyber Security Analyst

CyberWarFare Labs|2024

Comprehensive training covering web, network, OS, and cloud security, along with threat hunting, incident response, and SOC operations. Included extensive hands-on labs on OWASP Top 10, pentesting methodologies, and defensive security practices through a practical, project-based approach.

TIMELINE

Professional Experience

What began with risky downloads turned into a passion for protecting the digital world.

July-2024 - August 2024

Cybersecurity Intern

ShadowFox ยท Internship

Conducted a comprehensive security assessment on web apps by identifying potential vulnerabilities and preparing a detailed professional report to provide insightful remediation methods.

Key Achievements:

  • โ–ธGained hands on skills on VAPT
  • โ–ธGained hands on tools experience such as NMAP, Wireshark, Nikto, openVAS and Burp Suite
  • โ–ธUnderstanding of writing a professional vulnerability assessment report to understand client and dev team engagement.
Nov 2023 - Dec 2023

SOC Analyst Intern

Chaitanya Cyber Strix Technologies Pvt Ltd ยท Internship

Security monitoring and incident investigation in a SOC environment. Performed deep-dive analysis of security alerts, threat intelligence integration, and coordination with security teams for incident containment.

Key Achievements:

  • โ–ธGained hands on experience in monitoring ,detecting and analyzing security events using Splunk and Elastic SIEM.
  • โ–ธSupported threat hunting activities using log analyses and IOC searches.
  • โ–ธLearned SIEM dashboard queries to investigate alerts.
  • โ–ธLearned and applied MITRE ATT&CK framework for categorizing mapping adversial techniques.

KNOWLEDGE SHARING

My recent logs

Technical articles & insights on Cybersecurity

SECURE CONTACT

Drop a Secure Message

For sensitive topics, reach out through the channels below. Encrypted links and trusted networks are always preferred.

|
|
Anamay Mishra - Cybersecurity Professional Portfolio