> whoami

Niteesh Komurlekar

|

SOC Analyst with hands-on experience across India's central banking infrastructure and a global MDR provider in Ireland. Specialising in real-time threat detection, incident response, and SIEM-driven investigations across large-scale enterprise environments.

Blue Team 1.3 Yrs SOC eJPT ICCA OSCP — In Progress
Niteesh Komurlekar

About Me

SOC Analyst with hands-on experience across India's central banking infrastructure and a global Managed Detection & Response provider in Ireland. I specialize in real-time threat detection, incident response, and SIEM-driven investigations across large-scale enterprise environments.

My journey from ReBIT — the cyber arm of the Reserve Bank of India — to eSentire in Ireland has given me a rare combination of BFSI security depth and international MDR exposure. Actively pursuing growth in SOC L2/L3 and Threat Intelligence.

2021 ReBIT, Mumbai
SOC Analyst
2022 MTU, Ireland
PG Cybersecurity
2023 Professional Development
eJPT · ICCA · Labs
2025 eSentire, Ireland
SOC Analyst

Technical Skills

SIEM & Log Analysis

  • IBM QRadar
    Proficient
  • Microsoft Sentinel
    Working
  • SumoLogic
    Working

Endpoint & EDR

  • Malware Triage
    Proficient
  • IOC Identification
    Proficient
  • Alert Validation
    Proficient

Network Security

  • Wireshark / CloudShark
    Proficient
  • Check Point / Cisco ASA
    Working
  • Palo Alto / Fortinet
    Working
  • IDS/IPS
    Working

Scripting

  • Python
    Working
  • Bash
    Working
  • PowerShell
    Working

Cloud & Identity

  • Microsoft M365 / Azure
    Working
  • Okta / Microsoft Entra ID
    Working
  • AWS
    Familiar
  • LaceWork / GCP
    Familiar

Offensive & DFIR

  • VAPT / eJPT
    Proficient
  • Autopsy / Volatility
    Proficient
  • Nmap / Burp Suite
    Working
  • Static & Dynamic Malware Analysis
    Working

Frameworks & Standards

MITRE ATT&CK NIST CSF OWASP Top 10 Kill Chain PICERL

Experience

Oct 2025 – Present Current

SOC Analyst

eSentire · Ireland

Global MSSP | 24x7 Managed Detection & Response

  • Operate within eSentire's Atlas XDR Platform — monitoring and triaging security alerts across endpoint, network, log, cloud, and identity sources for enterprise clients globally.
  • Conduct customer investigations by pivoting across CrowdStrike Falcon, SentinelOne, Carbon Black EDR, and Microsoft Defender for Endpoint to build timelines of malware and intrusion activity.
  • Investigate identity-based alerts using Okta, Microsoft Entra ID, and Microsoft Defender for O365 and Cloud Apps.
  • Analyse firewall and network telemetry from Palo Alto, Fortinet, Check Point, and Cisco ASA to support active incident investigations.
  • Work with vulnerability data from Qualys, Rapid7, and Tenable to correlate exposure context during incident triage.
  • Perform static and dynamic malware analysis; document IOCs and findings for internal incident handling channels and client reporting.
Atlas XDRCrowdStrikeSentinelOneEntra IDPalo AltoQualys
Nov 2023 – Oct 2025

Professional Development & Upskilling

Self-Directed · Cybersecurity Research & Lab Work

  • Built a Windows Active Directory home lab simulating Red Team TTPs — reconnaissance, lateral movement, exploitation, and evasion detection.
  • Completed LetsDefend SOC Analyst Path covering incident triage, malware analysis, and SIEM-based detection workflows.
  • Earned eJPT (Dec 2024) and ICCA (Feb 2025) certifications through INE Security.
  • Regular practice on HTB Academy — focused on AD-based Windows boxes and Linux privilege escalation.
  • Studied enumeration, PowerShell-based attacks, and persistence mechanism detection.
eJPTICCAHTBAD LabLetsDefend
Sep 2022 – Nov 2023

PG Diploma — Cybersecurity

Munster Technological University · Cork, Ireland

  • Full-time postgraduate program focused on practical cybersecurity skills.
  • Modules: Network Security, Malware Analysis, DFIR, Offensive Security, Scripting.
  • Built foundational skills in penetration testing, digital forensics, and threat analysis.
Network SecurityMalware AnalysisDFIROffensive Security
Nov 2021 – Aug 2022

SOC Analyst

Reserve Bank Information Technology (ReBIT) · Mumbai, India

RBI-established entity securing India's banking cyber infrastructure

  • Monitored and triaged security alerts using IBM QRadar across 60,000+ endpoints in India's central banking ecosystem.
  • Investigated incidents using log data from Checkpoint/Cisco ASA firewalls, IDS/IPS, and endpoint controls.
  • Conducted phishing analysis, improved mail filter policies, and delivered user awareness training.
  • Performed threat hunting and IOC correlation tied to APTs targeting Indian financial sector.
  • Reduced average incident resolution time by 40% through streamlined documentation.
  • Maintained KPI reports and weekly/monthly metrics for SOC leadership.
QRadarCheckpointIDS/IPSBFSIAPT Hunting
2017 – 2021

BE — Electronics & Telecommunication

Vidyalankar Institute of Technology · Mumbai, India

  • Engineering foundation covering networking, signal processing, and embedded systems.
NetworkingElectronicsTelecom

Toolkit

Tools I have worked with across SOC operations, incident response, and offensive security.

SIEM & Log Management

IBM QRadar Microsoft Sentinel SumoLogic

EDR & Endpoint

CrowdStrike Falcon CrowdStrike Identity SentinelOne Carbon Black EDR Carbon Black Bluesteel Microsoft Defender for Endpoint

Network & Firewall

Wireshark CloudShark TCPdump Palo Alto Networks Fortinet Check Point Cisco ASA IDS/IPS Web Proxies

Cloud & Identity

Microsoft M365 Microsoft Defender for O365 Microsoft Entra ID Okta Azure AWS GCP LaceWork

Platforms & Case Mgmt

eSentire Atlas XDR ServiceNow Jira VMware VirtualBox

Vulnerability Management

Qualys Rapid7 Tenable

DFIR & Malware Analysis

Autopsy Volatility Static Malware Analysis Dynamic Malware Analysis Timeline Analysis File System Forensics

Offensive Security

Nmap Burp Suite Metasploit BloodHound Mimikatz Netcat Gobuster

Scripting & Automation

Python Bash PowerShell KQL

Certifications

eJPT

eLearnSecurity Junior Penetration Tester

INE / eLearnSecurity

Certified — Dec 2024
Earned
ICCA

INE Certified Cloud Associate

INE Security

Certified — Feb 2025
Earned
OSCP

Offensive Security Certified Professional

Offensive Security

Expected — Oct 2026
In Progress

Projects & Lab Work

active_directory_lab.sh

Windows AD Home Lab

Built a full Active Directory environment in VirtualBox/VMware to simulate Red Team TTPs and practice detection engineering. Covers reconnaissance, exploitation, lateral movement, and evasion — all logged and analyzed in SIEM.

VirtualBoxWindows ServerSplunkBloodHound
  • LLMNR poisoning, Kerberoasting, Pass-the-Hash simulation
  • Custom detection rules for common AD attacks
  • PowerShell attack techniques and evasion methods
oscp_journey.sh

OSCP Lab Progress

Actively progressing through Offensive Security's PEN-200 course and PWK labs. Focus on privilege escalation, Active Directory attacks, and buffer overflow exploitation.

Kali LinuxMetasploitBurp SuitePEN-200
  • Linux & Windows privilege escalation techniques
  • Active Directory attack chains in lab environment
  • Expected certification: October 2026
blue_team_lab.sh

LetsDefend SOC Analyst Path

Progressing through LetsDefend's SOC Analyst learning path with focus on incident triage, malware analysis, and log-based threat detection workflows.

LetsDefendHTB AcademyWireshark
  • Incident triage and escalation workflows
  • Malware analysis and sandbox investigation
  • Log-based detection and SIEM rule writing