6+ years building detection frameworks, leading SOC operations through critical incidents, and applying adversary simulation to sharpen defenses. Oracle Hall of Fame. NCIIPC ×15.
$ whoami
sai_prashanth_pulisetti
# SOC Lead · Detection Engineer · Purple Teamer
$ cat expertise.conf
▸ Threat Hunting & DFIR
▸ SIEM Engineering (Elastic · Sentinel · Splunk)
▸ Malware Analysis & IOC Extraction
▸ Purple Team Ops — CRTE / CRTO
▸ Sigma · YARA · KQL · EQL · SPL
$ ls ./recognition/
oracle_hall_of_fame.txt
nciipc_15_disclosures/
top_performer_2022_2023.award
300_detection_rules.sigma
$ ▊
I'm a cybersecurity professional with 6+ years leading Security Operations Centers and building detection frameworks at scale. I've handled everything from P1 ransomware incidents at 3 AM to architecting enterprise-grade SIEM deployments from scratch.
My edge is bridging red and blue. Holding CRTE, CRTO and CRTP certifications, I apply adversary simulation thinking to write detection logic that catches real-world techniques — not just textbook ones.
Beyond operations, I contribute through open-source tooling, 15 responsible disclosures to NCIIPC, a critical Oracle vulnerability report, and published research on threat hunting methodologies.
Converts Sigma detection rules into Elastic ECS-aligned queries and Azure Sentinel KQL — bridging community rule formats and production SIEM deployment with zero manual conversion effort.
Extracts Indicators of Compromise from open-source threat intelligence blogs and converts them automatically into Elastic SIEM-ready hunting queries for real-time detection.
300+ custom detection rules authored from real malware samples, threat actor TTP research, and enterprise SOC operational experience across financial sector environments.
Parses email headers, detects phishing patterns, and extracts threat intelligence for SOC triage workflows.
Obsidian plugin for password strength analysis, HIBP breach checking, and secure password generation.
Fetching threat intelligence…
Sourced from The Hacker News, BleepingComputer, and CISA. Updates every 3 hours.
Loading articles…
Critical vulnerability discovery acknowledged in Oracle's official security hall of fame
15 responsible disclosures acknowledged by India's national cyber authority
Bug bounty recognitions across major enterprise platforms and security communities
Consecutive Top Performer of the Year for exceptional SOC leadership in 2022 & 2023
Open to collaboration on security research, purple team engagements, open-source detection tooling, and knowledge sharing. Working on something interesting in defensive security? Let's talk.
operator = {
"name": "Sai Prashanth Pulisetti",
"role": "SOC Lead | Detection Engineer",
"certs": ["CRTE", "CRTO", "CRTP", "CHFI"],
"open_to": [
"Security Research",
"Purple Team Engagements",
"OSS Detection Tooling",
"Knowledge Sharing",
],
"response": "within 48 hours",
"status": "AVAILABLE",
}
print(f"Reach: {operator['name']}")
print(f"Status: {operator['status']}")