Securing the case clasps…
work terminal Codex
verified MACUSA · Apprentice Keeper · 1926
— Field Journal · Vol. I —

Wand & Wireshark

A magizoologist's defense against the dark arts of the wire.

VALLI · A

Tracker of digital beasts. Tamer of network traffic. Apprentice keeper of the Magical Security Bureau, trained in SOC operations, threat hunting, and the careful documentation of incidents that go bump in the wire.

shield Containment Wards · Beasts Secured
Case Latches 99.9%
Erumpent Containment Active
Niffler Vault Scanning
Bowtruckle Watch Posted
eth0 · live capture · Ministry Line
9342277973 · valli00283@gmail.com · /in/valli003 · Thoraipakkam, Chennai
ID :: VALLI-A
CLR :: ENTRY
STATUS :: ACTIVE
// IDENTITY :: WHOAMI

VALLI A

SOC Analyst & Cybersecurity Engineer

Final-year B.E. (Cybersecurity) operator with three SOC/CSOC tours, hands-on tooling across Wireshark, Nmap, Burp Suite and Metasploit, and a working memory of how attackers think. Currently scanning for entry-level opportunities in threat detection and incident response.

call +91 9342277973 mail valli00283@gmail.com link www.linkedin.com/in/valli003 location_on Thoraipakkam, Chennai
terminal Open Secure Channel
I
:: 0x01 MISSION_BRIEF
Folio I · The Field Journal

An Apprentice's Working Vow

I read networks the way Newt reads a creature's footprint — slowly, patiently, never trusting a packet that won't sign its name. By day a final-year student of cybersecurity at Jerusalem College of Engineering; by candlelight a tracker of dark arts in traffic, a sworn keeper of the Magical Security Bureau, and an aspiring SOC analyst seeking the right beast to track next.

// MISSION_BRIEF

Motivated cybersecurity student with hands-on experience in SOC operations, vulnerability assessment, and incident monitoring. Seeking an entry-level cybersecurity role to apply skills in threat detection and strengthen organizational security posture.

II
— Folio II · Beast Affinities —

Four Beasts, One Apprentice

Each compartment of my case houses a creature that taught me a discipline. Tap a medallion to see what each beast guards.

Instinct · Curiosity

Niffler · Threat Hunting

Relentless. Digs up shiny anomalies others walk past — a TTL that doesn't add up, a TLS handshake that smells of glamour. The Niffler in me follows the glint.

  • Wireshark
  • Nmap
  • Packet Analysis
:: 0x02 DISCIPLINES

Discipline Focus

// THREAT HUNTING

Wireshark, Nmap, packet analysis. Investigating anomalies in real-time captures.

// DEFENSIVE POSTURE

Burp Suite, Metasploit, OWASP. Reproducing findings cleanly so they get fixed.

// NETWORKING

TCP/IP, OSI, firewalls, VPN. Adaptive infrastructure thinking.

// IR & SIEM

SIEM tuning, IDS/IPS monitoring, threat analysis from internship floor.

III
:: 0x03 EDUCATION_LOG
Folio III · Apprenticeship

Academic Pedigree

B.E. Computer Science & Engineering (Cybersecurity)

Jerusalem College of Engineering, Chennai

2022 – 2026 CGPA · 8.1
HSC · St. Pius Matriculation 69.16% · 2022
SSLC · St. Pius Matriculation 78.4% · 2020

Education Log

B.E. CSE (Cybersecurity)

Jerusalem College of Engineering · 2022–2026 · CGPA 8.1

HSC, St. Pius Matriculation

69.16% · 2022

SSLC, St. Pius Matriculation

78.4% · 2020

school Coursework Highlights
  • Network & OS fundamentals
  • Web application security
  • Cryptography & secure protocols
  • Threat intelligence & SOC operations
IV
:: 0x04 EXPERIENCE_LOG

history_edu Field Expeditions

Internship · Most Recent

SOC Analyst Intern

FUJISOFT · FST Information Technology Pvt Ltd · Perungudi

Monitored security alerts, supported threat identification, and documented findings while learning SOC operations end-to-end. The "Thunderbird" tour — sensing storms before they break.

Internship · CSOC

CyberFort

Fortifying Digital Security · T. Nagar, Chennai

Assisted with CSOC operations, performed vulnerability documentation, and contributed to internal security audit reports. The patient art of writing it down so the next analyst can read it.

Internship · Cyber Crime Cell

Cyber Crime Intern

E1 Police Station · Mylapore

Assisted in cybercrime documentation, digital evidence organization, and exposure to incident investigation workflows — case-files moving from victim report to court-ready evidence.

SOC Analyst Intern

ACTIVE

FST Information Technology Pvt Ltd (FUJISOFT) · Perungudi

Monitored security alerts, supported threat identification, and documented findings while learning SOC operations end-to-end.

CyberFort

Fortifying Digital Security · T. Nagar, Chennai

Assisted with CSOC operations, performed vulnerability documentation, and contributed to internal security audit reports.

Cyber Crime Intern

E1 Police Station · Mylapore

Assisted in cybercrime documentation, digital evidence organization, and exposure to incident investigation workflows.

V
:: 0x05 PROJECTS_DEPLOYED

The Case Compartment

Two grimoires kept in the case: one for tracking, one for trapping. The Pensieve pours their captures into running ink.

hub PROJECTS DEPLOYED

niffler_sniffer.py · ⌥ pensieve
radar Niffler Sightings
  • DNS-tunnel suspect
    10.0.0.7 · ttl anomaly
    10:42
  • TLS handshake anomaly
    142.250.190.78 · cipher mismatch
    10:43
  • ICMP burst
    192.168.1.42 · contained
    10:44
  • Phishing-domain heuristic
    login-secure-update[.]xyz
    10:46
science Niffler's Audit · Before / After
Time-to-first-detection
14m2m
False positives
22%6%
Protocol coverage
37
Capture latency
~80ms~12ms
Margin Notes · The Field
# scapy filter loop — protocol monitor
def watch(pkt):
  if pkt.haslayer(IP):
    if pkt[IP].ttl < 32:
      flag(pkt, "low-ttl spoof?")
This loop trusted ttl values too far. Threshold lowered to 24 after a noisy fortnight in the CSOC. — V
Grimoire I · Tracker

EtherSpy

A Niffler that only steals suspicious packets

Python pipeline built on Scapy that captures, classifies, and watches over real-time network traffic. Filters by protocol, flags anomalies, and writes a clean field-note for every encounter.

Python Scapy Packet Analysis
Grimoire II · Trap

HATIS

Honeypot lure for spoof-attribution

A honeypot-based system that analyzes cyberattacks, traces spoofed IPs, and generates attacker attribution insights. Bait set, beast caught, ledger updated.

Honeypot Traceback Threat Intel

EtherSpy

network_ping

Network Traffic Analysis Tool

A Python-based packet capture tool built on Scapy. Monitors, filters, and analyzes real-time network traffic.

Python Scapy Packet Analysis

HATIS

radar

Honeypot-Assisted IP Traceback System

A honeypot-based system that analyzes cyberattacks, traces spoofed IPs, and generates attacker attribution insights.

Honeypot Traceback Threat Intel
VI
:: 0x06 TECHNICAL_STACK

vpn_key Wandcraft & Tools

Wand-Cores · Cybersecurity Tools
Wireshark Nmap Burp Suite Metasploit
Schools of Defense · Concepts
SIEM IDS/IPS Threat Analysis Vulnerability Assessment
Networking Charms
TCP/IP DNS OSI Model Firewalls VPN
Familiars · Operating Systems
Windows Linux
VII
:: 0x07 LANGUAGES
translate Tongues Spoken
Tamil English
co_present Oratory & Pitchcraft
  • Pitching ideas & proposals
  • Verbal communication
  • Slide deck creation
  • Technical presentation
VIII
— Folio VIII · The Case Diagram —

A Map of Newt's Case

Each compartment of the case is a Folio of this codex. Tap any glowing pin to apparate.

— Newt's Case · Folio Map —
IX
:: 0x09 OPEN_CHANNEL

forward_to_inbox cell_tower Send Word · By Owl

A barn owl departs the Owlery the moment your seal closes. Replies typically return within two moons — sooner, if you tip Hedwig.

Sealed Parchment

A Letter to the Magizoologist

// COMPOSE_MESSAGE