Cybersecurity Analyst & Developer

Hi, I'm
Harshit Gupta

>
Explore My Work
Professional Profile
Cyber Labs
L
Coding Practice
Explore
DEFENSIVE POSTURE

What I Do

I work in cybersecurity, focusing on threat detection, data protection, and automation. I handle real-world security incidents and build solutions to improve detection and response.

Threat Detection & Response

Monitoring and investigating phishing, malware, and insider threats using tools like CrowdStrike and Microsoft Defender, ensuring timely detection and mitigation.

SYS.ACTIVE

Data Security & Encryption

Working with Microsoft Purview for data loss prevention (DLP) and sensitive data classification, along with Thales CipherTrust Manager for encryption and key management.

SYS.ACTIVE

Security Automation & Dev

Building tools and scripts to automate log analysis and security workflows, along with developing practical applications like phishing detection systems.

SYS.ACTIVE
The Person Behind the Work

Who I Am

Based in Gurugram, I have always been curious about what happens behind the scenes — not just how systems work, but what makes them fail.

That curiosity evolved from building software to understanding how it can be exploited — studying vulnerabilities, attacker behavior, and how real-world cybersecurity incidents actually unfold.

During college, working as a Subject Matter Expert at Chegg pushed me to think more clearly and communicate complex ideas simply — where my technical fundamentals solidified.

Today, I work on real enterprise security challenges — monitoring threats, protecting critical data, and understanding how systems behave under pressure.

Outside of work, I design and build security tools, explore new research areas, and continuously sharpen my skills.

Securing systems. Expanding boundaries.
STATUS: OPERATIONAL

Core Expertise

0102030405060708
[01]

Threat Detection

SIEM/EDR Monitoring

Lvl 5
[02]

Incident Response

Playbook Execution

Lvl 5
[03]

Splunk / SIEM

Advanced Search

Lvl 5
[04]

CrowdStrike / EDR

Endpoint Containment

Lvl 5
[05]

Microsoft Defender

XDR Implementation

Lvl 4
[06]

Microsoft Purview

DLP & Governance

Lvl 5
[07]

Vulnerability Assessment

Qualys Scanning

Lvl 4
[08]

Threat Hunting

Behavior Analysis

Lvl 4
Career_Trajectory

Operational Experience_

Active Role

Accenture

>Security Delivery Associate

Part of a Security Operations team, working on real-time threat monitoring, incident handling, and data protection across enterprise systems.

_Monitored and analyzed security alerts across SIEM and EDR platforms (Splunk, CrowdStrike, Microsoft Defender) to identify potential threats
_Performed alert triage and investigation, supporting incident response workflows including analysis, documentation, and containment actions
_Managed encryption operations and key lifecycle processes using Thales CipherTrust for enterprise data security
_Implemented and supported data protection policies using Microsoft Purview, ensuring compliance and secure handling of sensitive data
Aug 2024 – Present
Gurugram, IN
Thales CipherTrustMicrosoft PurviewSplunkCrowdStrikeMicrosoft DefenderPython
Internship

Accenture

>Cyber Security Intern

Gained hands-on experience in vulnerability management, log analysis, and SOC workflows within an enterprise security environment.

_Conducted vulnerability assessments using Qualys and assisted in risk prioritization and remediation tracking
_Assisted in monitoring and analyzing security alerts using Splunk as part of SOC triage processes
_Performed basic investigation of alerts, helping identify false positives and potential security events
_Developed Python scripts for log parsing and data analysis to support security monitoring tasks
Mar 2024 – June 2024
Gurugram, IN
QualysSplunkPython
Freelance

Chegg

>Subject Matter Expert

Delivered structured solutions and guidance across core computer science topics, with a focus on problem-solving and algorithmic thinking.

_Solved diverse algorithmic problems focusing on optimal approaches, time complexity, and clean implementation
_Guided students in understanding core CS concepts, improving their problem-solving and analytical thinking skills
_Wrote clear, step-by-step technical solutions to complex problems, ensuring accuracy and readability
_Strengthened ability to break down complex logic into simple, structured explanations for diverse learners
Freelance
Remote
C++JavaData Structures & Algorithms
Selected Projects

Systems I've Built

01 / 03Security Tooling

Phishio AI

Real-time phishing detection platform that automates URL risk analysis using multi-signal threat intelligence — reducing manual triage effort and accelerating incident response.

Problem

Security teams rely on manual URL triage, leading to delayed detection and increased exposure to phishing attacks.

Solution

Built a FastAPI-based pipeline that aggregates domain intelligence, analyzes behavioral signals, and generates real-time risk scores.

Impact

Reduced investigation time significantly and enabled faster threat containment through automated decision-making.

PythonFastAPIBeautifulSoupVercel
phishio · preview
URLhttps://secure-paypal.verify-usr-access.co/login
Domain Age———
SSL Certificate———
Redirect Chain———
Reputation Score———
Content Patterns———
WHOIS Disclosure———
Risk Score
0/100
02 / 03AI Assistant

JARVIS

Voice-driven AI assistant for system automation and real-time information retrieval, designed to streamline repetitive workflows and improve operational efficiency.

Interface

Implemented voice-based command execution for system tasks, enabling hands-free interaction and workflow automation.

Engine

Integrated GPT-based intelligence with offline TTS capabilities, ensuring low-latency responses and partial offline functionality.

Performance

Optimized asynchronous processing to reduce response latency and improve execution efficiency across tasks.

PythonOpenAIPyttsx3SpeechRecognition
jarvis · preview
Listening...
Open dashboard
Search latest ML papers
Trigger incident response playbook
03 / 03Crypto Intelligence

NOBTO

Real-time cryptocurrency intelligence platform delivering live market insights, exchange comparisons, and high-frequency data visualization.

Data Pipeline

Designed a high-frequency polling system integrating multiple exchange APIs for real-time price tracking and arbitrage insights.

Frontend

Built a performance-optimized UI with dynamic charting and minimal re-rendering for smooth real-time updates.

Scalability

Handled concurrent API responses efficiently, ensuring stable performance under continuous data flow.

ReactJSChakraUIJavaScriptREST API
nobto · preview
LIVE
BTC$67,240.50+2.40%
ETH$3,512.20+1.80%
SOL$182.45-0.60%
Ops_Timeline

PerformanceGrid_

● STATUS: LIVE ACTIVITY STREAM● SOURCE: MULTI-PLATFORM INPUT
Ops_Log
ANALYSIS2026.03.25

Reverse engineered phishing payload patterns and improved detection logic

STREAK2026.03.20

Maintained 180+ day offensive security learning streak (TryHackMe)

DETECTION2026.03.15

Developed ML-based phishing URL classifier with heuristic fallback system

SOC2026.03.05

Analyzed simulated SOC alerts and triaged false positives vs real threats

OSINT2026.02.25

Performed OSINT investigation tracing digital footprint across public sources

CERT2026.02.15

Completed CSEDP certification with merit distinction

FORENSICS2026.02.08

Investigated network traffic using Wireshark to identify suspicious patterns

CTF2026.01.28

Solved multi-stage CTF challenges involving web exploitation and privilege escalation

AUTOMATION2026.01.10

Built automation scripts for reconnaissance and enumeration workflows

CLOUD2025.12.20

Secured Azure cloud fundamentals with identity and access management concepts

🌐LIVE
THM_STREAK
---
Consecutive Days
Rank: Wizard 0xA
⚔️LIVE
LC_STREAK
---
Day Streak
💾LIVE
GH_CONTRIBS
---
Total Contributions
OPS_CORE
Central activity processor tracking all operational signals in real-time.
W-8NOW
SYS_CORETryHackMeLeetCodeGitHubSOC TriageWeb ExploitPrivEscData StructML DetectAzure CloudOSINTAutomation
50+
OSINT_CASES
183+
THM_STREAK
970+
DSA_PROBLEMS
1K+
CODE_COMMITS
Core Strengths
👑
OFFENSIVE_SECURITY
TryHackMe
Hands-on exploitation & adversary simulation
⚔️
ALGORITHMIC_PROBLEM_SOLVER
LeetCode
Strong DSA & pattern recognition skills
💾
BUILD_ENGINEER
GitHub
Ships real-world tools & security systems
🏅
CTF_OPERATOR
Cyber Ranges
Applies skills in attack-defense scenarios
root@portfolio:~
$ whoami
⟹ Security Engineer | Offensive | Builder
$ focus --current
⟹ Phishing Detection Systems
⟹ SOC Simulation & Threat Analysis
⟹ Automation of Security Workflows
$ tools --active
⟹ Purview · Splunk · Defender · OSINT
$ status
⟹ Building real-world detection systems
Domain_Strength
SEC_OPS
88
THREAT
82
DEV
72
ALGO
80
OSINT
75
Uptime_Status
LIVE
CONSISTENCY
HIGH
ACTIVITY_LEVEL
PEAK
LEARNING_CURVE
ASCENDING
BUILD_STATE
ACTIVE
$
SYSTEM_2026
SECURE LINK // INITIATE COMMS // SYSTEM READY // SECURE LINK // INITIATE COMMS // SYSTEM READY //
Terminal > Contact

INITIATE
CONNECTION

> Open for cybersecurity projects, collaborations, and opportunities.
> Initiate a secure link by transmitting your message.

"Attack surfaces evolve. Defenses must evolve faster. Let’s build secure systems."

Harshit Gupta_
© 2026· Next.js & Secured by Design