Skip to content
View gurvinny's full-sized avatar
🔐
Building cool things so attackers can’t
🔐
Building cool things so attackers can’t

Block or report gurvinny

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
gurvinny/README.md

Gurvin Singh

Typing SVG

LinkedIn Email TryHackMe


🛠️ Technology Stack & Workflows

Security Monitoring (SIEM): Splunk Elastic Microsoft Sentinel

Network Defense & Forensics: Wireshark pfSense Suricata

Automation & Systems: Python Linux Bash

Threat Intelligence & Detection: Sigma YARA KQL


🔬 Featured Security Projects

Repository Core Objective Primary Outcome
Security Analyst Portfolio SOC Methodology Sigma Rules, Incident Playbooks, and NIST-aligned Writeups.
Home Network Lab Infrastructure Enterprise-grade segmentation and IDS/IPS log aggregation.
Automated Phish Extractor Efficiency/Automation Python tool for 30-second IOC extraction and enrichment.
grv-flipper-lab Hardware Security & Research Protocol analysis and embedded systems testing.

📜 Professional Development

Certification Focus Areas Status
CompTIA Security+ Threat Management, Cryptography, Identity Exam Targeted: May 2026
THM SOC Level 1 SIEM, Digital Forensics, Traffic Analysis Advanced Standing

GitHub Streak

🟢   "The attacker needs to be right once. The defender needs to be right every time."

Pinned Loading

  1. security-analyst-portfolio security-analyst-portfolio Public

    Hands-on SOC analyst training portfolio covering threat detection, incident response, log analysis, and blue team lab investigations.

    1

  2. home-network-lab home-network-lab Public

    Enterprise-style home lab implementing VLAN segmentation, firewall isolation, and secure network architecture using pfSense.

  3. Automated-Phish-Extractor Automated-Phish-Extractor Public

    An automated triage tool for SOC analysts. Parses raw .eml files, extracts and defangs IOCs, analyzes SPF/DMARC headers, and generates standardized threat reports.

    Python 1 3

  4. grv-flipper-lab grv-flipper-lab Public

    Embedded systems, automation & security research using Flipper Zero. IR, RF, GPIO, NFC & protocol analysis.

    2