Skip to content
View Hemsagar11's full-sized avatar

Block or report Hemsagar11

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please donโ€™t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
Hemsagar11/README.md

๐Ÿ‘‹ Hey there, I'm Hem Sagar

๐Ÿ›ก๏ธ Cybersecurity Undergraduate | ๐Ÿ’ผ Intern @ PwC Acceleration Center | ๐Ÿง  SOC & SIEM Enthusiast | ๐Ÿ‡ฎ๐Ÿ‡ณ Based in India


๐Ÿš€ About Me

Iโ€™m Hem Sagar โ€” a cybersecurity student on a mission to secure the digital world one log, one alert, and one detection rule at a time.

Currently interning at PwC Acceleration Center, Bangalore, Iโ€™m gaining hands-on experience in SIEM, SOAR, Threat Intelligence, and Python automation. My focus is building scalable, intelligent solutions that bridge the gap between security visibility and actionable insight.

Whether it's building a custom SIEM from scratch or automating patch intelligence, I thrive at the intersection of engineering and defense.


๐Ÿงฐ My Tech Stack

Security Tools: Splunk, Microsoft Sentinel, Google SecOps, Defender, Elastic Stack
Languages: Python, Java (OOP), Bash
Platforms: Linux (Arch, Ubuntu), Windows, MacOS
Data & DevOps: Kafka, Apache Spark, Docker, MySQL
Dashboarding: Power BI, TailwindCSS, JavaScript


๐ŸŽ“ Learning Journey So Far

  • ๐Ÿง  PwC Launchpad 2024 Graduate

    • Trained in Python, Java, RDBMS, DevOps & Cybersecurity
  • ๐Ÿ‘จโ€๐Ÿ’ป Intern @ PwC Acceleration Center

    • Working on Vulnerability Management, Patch Automation, and CVE Prioritization

๐ŸŽฏ Areas of Interest

  • ๐Ÿ•ต๏ธโ€โ™‚๏ธ Threat Detection & Incident Response (Blue Team FTW!)
  • โš™๏ธ SIEM & SOAR Development
  • ๐Ÿงช Digital Forensics & Malware Analysis
  • ๐Ÿ“Š Security Data Analytics & Visualization
  • ๐Ÿšง Vulnerability Management & Threat Intel

๐Ÿ“š Projects & Highlights

  • ๐Ÿ“Œ SIEM Tool โ€“ Real-time correlation engine with Spark + Kafka + PyScript
  • ๐Ÿ“ˆ Patch Intelligence Script โ€“ Automated CVE mapping using Python and MSRC
  • ๐Ÿง  SOC Analyst Playbooks โ€“ Custom workflows for incident triage and detection use cases

๐ŸŒ Connect With Me


โ€œHack to learn. Defend to protect. Build to empower.โ€
โ€” Hem Sagar


Popular repositories Loading

  1. SableEye SableEye Public

    A lighweight C++ based Keylogger that uses windows API to hook the keystrokes.

    C++ 1

  2. 20CYS202-User-Interface-Design 20CYS202-User-Interface-Design Public

    Forked from Amrita-TIFAC-Cyber-Blockchain/20CYS202-User-Interface-Design

    20CYS202 - User Interface Design - 3rd Sem - B.E. CSE(CYS) - ASE, CBE

  3. 20CYS202-UID 20CYS202-UID Public

    User Interface Design(20CYS202) SEM-03

    HTML

  4. 20CYS281-Operating-System-Lab 20CYS281-Operating-System-Lab Public

    Forked from Amrita-TIFAC-Cyber-Blockchain/20CYS281-Operating-System-Lab

    20CYS281 - Operating System Lab - 3rd Sem - B.E. (CSE-CYS) - ASC, CBE.

    C

  5. 20CYS383-Java-Programming-Lab 20CYS383-Java-Programming-Lab Public

    Forked from Amrita-TIFAC-Cyber-Blockchain/2023_20CYS383-Java-Programming-Lab

    20CYS383 - Java Programming Lab - 4th Sem - B.E. CSE(CYS) - ASE, CBE

    Java

  6. SimpleHTR SimpleHTR Public

    Forked from githubharald/SimpleHTR

    Handwritten Text Recognition (HTR) system implemented with TensorFlow.

    Python