// cyber security · soc · security testing & assurance

Yuvraj Kaushal

SOC Analyst // Cyber Security Specialist // Security Engineer

Cyber Security professional focused on planning, executing, and validating security testing across enterprise environments. I work on security control validation, vulnerability remediation testing, and assurance aligned to NIST CSF, ISO 27001, and ASD Essential Eight — turning security requirements into repeatable test scenarios and clear evidence for both technical and executive stakeholders.

locationAdelaide, AU
emailykaushal46@gmail.com
focusSOC · Pen Testing · Assurance
Yuvraj Kaushal
id YK-046
clearance SOC · L2
$ whoami
yuvraj kaushal // soc + security tester
$ frameworks
nist csf · iso 27001 · asd essential eight
$ stack
splunk · sentinel · crowdstrike · sentinelone
01

specialisation

Security Operations

  • Incident Response & Triage
  • SIEM Monitoring & Tuning
  • Phishing Analysis
  • Threat Hunting
  • MITRE ATT&CK Mapping

Security Testing & Assurance

  • Security Control Validation
  • Vulnerability Remediation Testing
  • Test Scenario Design
  • Evidence-Based Test Artefacts
  • NIST CSF · ISO 27001 · ASD E8

Digital Forensics

  • Evidence Preservation
  • Log Analysis
  • Cloud Data Collection
  • IOC Detection
  • Cyber Risk Assessment

Tools & Platforms

  • Splunk · QRadar · Rapid7
  • Microsoft Sentinel
  • CrowdStrike Falcon
  • SentinelOne · OSQuery
  • Defender for Endpoint · Nozomi
  • Wireshark · Jira · ServiceNow

Cloud & Identity

  • Azure
  • O365
  • Endpoint Manager
  • Microsoft Purview
  • Entra ID / Active Directory
{ }

Languages & Networking

  • Python · C / C++ · Bash · PowerShell
  • MongoDB · MySQL · Git
  • TCP/IP · DNS · DHCP · VLANs
  • IDS / IPS
  • Windows · Linux · MacOS
certifications //
Splunk Core Power User SentinelOne Incident Responder SentinelOne Security Admin SentinelOne SE Expert SentinelOne Core Support CYBRARY SOC L1 Google IT Security · Defense Against the Dark Arts Google IT Infrastructure Services CISCO Ethical Hacking UoC Detection & Mitigation of Cyber Attacks
02

selected projects

/ 01

SOCSystem

Unified SOC dashboard integrating Splunk, Azure Sentinel, Snort, and VirusTotal for real-time threat monitoring. Automated alert aggregation reduced manual triage and shortened incident response loops.

SplunkSentinelSnortVirusTotal
/ 02

CAN Bus Hacking

Built a virtual automotive network to model CAN Bus attack surfaces. Simulated real-world exploits, mapped threat vectors, and tested mitigations against cyber-physical vehicle networks.

AutomotiveCANExploit SimHardening
/ 03

Spotify Recommendation System

ML-driven recommender comparing Linear Regression, KNN, and Random Forest on user interaction data. Random Forest emerged as the strongest model on engagement metrics.

Pythonscikit-learnRandom Forest
/ 04

Sign Language Detector & Translator

Real-time gesture recognition pipeline combining computer vision and deep learning to translate sign language into sentences — accessible communication for users with speech impairments.

CVDeep LearningAccessibility
03

experience

  1. Feb '26 — Present Adelaide University · Adelaide

    Teaching Assistant — INFO6004 Cloud Security

    Delivering Cloud Security curriculum: cloud threat models, identity security, and platform hardening. Facilitating RangeForce labs, supporting assessment design and evaluation, and mentoring students from diverse backgrounds.

  2. Jan '26 — Mar '26 Locked Shields 2026 · Sydney

    Co-Lead SOC — Adelaide University Partner Run

    Co-led blue team defensive operations across simulated enterprise environments — directing triage workflows in SentinelOne, leading endpoint and network vulnerability assessments, and modelling adversary behaviour against MITRE ATT&CK to proactively close attack-surface gaps.

    • Spearheaded threat hunting across endpoints and Active Directory, mapping findings to MITRE ATT&CK TTPs.
    • Established triage prioritisation frameworks to streamline alert handling and reduce MTTR across high-volume detection pipelines.
    • Developed and tuned SIEM detection rules to improve signal-to-noise ratio and ensure high-fidelity alerting.
    • Tuned EDR policies in SentinelOne to optimise visibility while minimising false positives.
    • Mentored junior SOC analysts in detection methodology, log analysis, and security tooling during live red vs blue exercises.
    • Collaborated with red team operators post-exercise to translate adversary tactics into defensive improvements and detection rule enhancements.
    • Conducted post-incident analysis and contributed to after-action reports — attack timelines, detection gaps, hardening recommendations.
    • Mapped observed actor behaviour to real-world APT profiles to enrich the team's threat intelligence picture.
  3. Sep '25 — Jan '26 Orro Group · Brisbane

    Junior Cyber Security Analyst

    Triaged threats across Microsoft Sentinel and Splunk, ran incident investigations across endpoint, network, and cloud, and contributed to security architecture and identity reviews — alongside hands-on security control validation and risk assessment work.

    • Reviewed and analysed threats using intelligence feeds, security logs, and reports to identify and prioritise cyber incidents.
    • Operated SIEM dashboards (Microsoft Sentinel, Splunk) to detect, investigate, and respond to security events.
    • Performed security scanning and vulnerability analysis to identify control gaps and misconfigurations.
    • Analysed alerts using SIEM and EDR tools — confirming true positives and reducing noise.
    • Enhanced detection use cases aligned with MITRE ATT&CK techniques.
    • Supported authentication and identity reviews across Active Directory and Entra ID.
    • Conducted security control validation and supported risk-assessment activities.
    • Built small automation scripts to improve investigative efficiency.
    • Documented findings and escalated issues with actionable insights for technical and business stakeholders.
  4. May '25 — Aug '25 University of Adelaide

    Teaching Assistant — COMPSCI 7328 Concepts in Cyber Security

    Delivered foundational cyber security tutorials covering threat landscapes, cryptography, and network security. Adapted explanations to varying technical backgrounds and supported assessment marking with constructive feedback.

  5. Feb '25 — Apr '25 Locked Shields 2025 · Adelaide

    SOC Analyst Intern — University of Adelaide Partner Run

    Monitored simulated enterprise environments during red vs blue team exercises. Performed incident response and triage with Splunk and CrowdStrike, identified endpoint and network vulnerabilities, and supported threat-hunting initiatives by correlating logs and anomalies against MITRE ATT&CK techniques.

  6. Sep '21 — May '23 Basware · India

    Junior Associate Security Engineer

    Tier 1/2 support across hybrid infrastructure: patching, endpoint access, and IAM tasks including account provisioning, MFA configuration, and AD group policy. Participated in SOC-lite alert logging, credential reset validation, and O365 triage — and authored SOPs for service interruptions, policy inconsistencies, and user onboarding.

04

terminal

yuvraj@adelaide:~
YK//shell v1.4.2 — type help to list commands.
last login: today · session: secure
yuvraj@adelaide:~$
05

contact

Open to SOC, security testing, and assurance roles — happy to talk about detection engineering, control validation, and cloud security work.

USER
FL45H
STATUS
COMPROMISED
PROGRESS
0/4

HBD.EXE

// four fragments. one system. break it open.

node_01 · breathing form

Watch the breathing form. Repeat the sequence. Three rounds — one mistake and the demon wins.

round 0 / 3 — press start

node_02 · cursed transmission

A cursed message intercepted. Reverse the Caesar shift to extract the domain expansion.

encrypted // shift = 3
PHOORVDB
hint: shift each letter back by 3.
awaiting input...

node_03 · reach anya

Anya wants peanuts. Navigate the maze, collect at least 12 peanuts, and reach her. Use arrow keys or WASD — or tap the controls below.

peanuts 0 / 12
target Anya anya
awaiting agent...

node_04 · system chaos

Three rounds. Wait for the ◯ to flash, then strike. Strike too early — round resets. Three perfect strikes in a row to clear the node.

press start to begin round 1

ACCESS GRANTED

SYSTEM RESTORED

// transmission decrypted

you came through ❤️ and made it through this like you do with everything in life with so much compassion and grit. this whole thing was built for one reason —

HAPPY BIRTHDAY, YUVRAJ 🎂

another year of being absurdly good at what you do and being the amazing lovable animal that you are — trying to put into words how much you mean to everyone around you is honestly impossible, but I hope this little project gives you a glimpse of how much you're appreciated and loved. here's to more adventures and travel and love and chaos in the best way. PS. i hope you like your new portfolio — it's a bit extra, but you deserve it.

— with love, your hidden system. //garu.eof