Azure Sentinel
,KQL Detections
,SOAR Playbooks
, andIncident Automation
. I build practical blue-team workflows for detection engineering, incident response, and security operations.About
B.Tech in Cybersecurity & Digital Forensics at Galgotias University (2022–2026, expected). I focus on SOC operations, incident response, threat hunting, and defensive security automation aligned with real-world blue-team workflows.
Skills
Featured
May 2026 - Present
India
• Architected and deployed a production-grade Microsoft Sentinel SIEM + SOAR environment for real-time threat detection and automated response.
• Engineered advanced KQL analytics rules including brute-force detection with high-fidelity alerting.
• Developed and integrated custom Logic Apps playbooks triggered via Automation Rules for account, source IP, host, and timestamp enrichment.
• Configured enterprise logging infrastructure using Azure Monitor Agent, custom DCRs, Syslog, and system logs.
• Implemented full SOC workflow: log ingestion → real-time KQL detection → incident creation → automated SOAR response.
• Conducted extensive testing, tuning, and documentation of detection rules, playbooks, and runbooks for production readiness.
January 2023 - Present
India
• Completed TryHackMe premium defensive security path with advanced modules in alert triage, threat hunting, incident response, and purple-team simulations.
• Developed multiple Python-based automation frameworks for log parsing, behavioral anomaly detection, phishing email analysis, and security orchestration.
• Built and maintained client-side security tools focused on digital forensics, malware analysis support, and OSINT collection for threat intelligence.
• Performed regular threat-hunting exercises using MITRE ATT&CK framework and custom detection logic across simulated environments.
Featured

Architected and deployed a production-grade Sentinel SIEM + SOAR environment with KQL detections, automation rules, and real-time incident response workflows.

Built hands-on defensive security workflows for alert triage, threat hunting, incident response, and purple-team simulations aligned with MITRE ATT&CK.

Focused forensic utility for recovering deleted artifacts and investigating user-deleted traces to support practical digital forensics workflows.

Built a utility focused on recovering cached artifacts and supporting malware-analysis and OSINT-adjacent investigations.
Engineered by Pulkit Rai
© 2026. All rights reserved.