Hi, I'm
Harshit Gupta
What I Do
I work in cybersecurity, focusing on threat detection, data protection, and automation. I handle real-world security incidents and build solutions to improve detection and response.
Threat Detection & Response
Monitoring and investigating phishing, malware, and insider threats using tools like CrowdStrike and Microsoft Defender, ensuring timely detection and mitigation.
Data Security & Encryption
Working with Microsoft Purview for data loss prevention (DLP) and sensitive data classification, along with Thales CipherTrust Manager for encryption and key management.
Security Automation & Dev
Building tools and scripts to automate log analysis and security workflows, along with developing practical applications like phishing detection systems.
Who I Am
Based in Gurugram, I have always been curious about what happens behind the scenes — not just how systems work, but what makes them fail.
That curiosity evolved from building software to understanding how it can be exploited — studying vulnerabilities, attacker behavior, and how real-world cybersecurity incidents actually unfold.
During college, working as a Subject Matter Expert at Chegg pushed me to think more clearly and communicate complex ideas simply — where my technical fundamentals solidified.
Today, I work on real enterprise security challenges — monitoring threats, protecting critical data, and understanding how systems behave under pressure.
Outside of work, I design and build security tools, explore new research areas, and continuously sharpen my skills.
Core Expertise
Threat Detection
SIEM/EDR Monitoring
Incident Response
Playbook Execution
Splunk / SIEM
Advanced Search
CrowdStrike / EDR
Endpoint Containment
Microsoft Defender
XDR Implementation
Microsoft Purview
DLP & Governance
Vulnerability Assessment
Qualys Scanning
Threat Hunting
Behavior Analysis
Operational Experience_
Accenture
>Security Delivery Associate
Part of a Security Operations team, working on real-time threat monitoring, incident handling, and data protection across enterprise systems.
Accenture
>Cyber Security Intern
Gained hands-on experience in vulnerability management, log analysis, and SOC workflows within an enterprise security environment.
Chegg
>Subject Matter Expert
Delivered structured solutions and guidance across core computer science topics, with a focus on problem-solving and algorithmic thinking.
Systems I've Built
Phishio AI
Real-time phishing detection platform that automates URL risk analysis using multi-signal threat intelligence — reducing manual triage effort and accelerating incident response.
Security teams rely on manual URL triage, leading to delayed detection and increased exposure to phishing attacks.
Built a FastAPI-based pipeline that aggregates domain intelligence, analyzes behavioral signals, and generates real-time risk scores.
Reduced investigation time significantly and enabled faster threat containment through automated decision-making.
JARVIS
Voice-driven AI assistant for system automation and real-time information retrieval, designed to streamline repetitive workflows and improve operational efficiency.
Implemented voice-based command execution for system tasks, enabling hands-free interaction and workflow automation.
Integrated GPT-based intelligence with offline TTS capabilities, ensuring low-latency responses and partial offline functionality.
Optimized asynchronous processing to reduce response latency and improve execution efficiency across tasks.
NOBTO
Real-time cryptocurrency intelligence platform delivering live market insights, exchange comparisons, and high-frequency data visualization.
Designed a high-frequency polling system integrating multiple exchange APIs for real-time price tracking and arbitrage insights.
Built a performance-optimized UI with dynamic charting and minimal re-rendering for smooth real-time updates.
Handled concurrent API responses efficiently, ensuring stable performance under continuous data flow.
PerformanceGrid_
Reverse engineered phishing payload patterns and improved detection logic
Maintained 180+ day offensive security learning streak (TryHackMe)
Developed ML-based phishing URL classifier with heuristic fallback system
Analyzed simulated SOC alerts and triaged false positives vs real threats
Performed OSINT investigation tracing digital footprint across public sources
Completed CSEDP certification with merit distinction
Investigated network traffic using Wireshark to identify suspicious patterns
Solved multi-stage CTF challenges involving web exploitation and privilege escalation
Built automation scripts for reconnaissance and enumeration workflows
Secured Azure cloud fundamentals with identity and access management concepts
INITIATE
CONNECTION
> Initiate a secure link by transmitting your message.
"Attack surfaces evolve. Defenses must evolve faster. Let’s build secure systems."