About
2025-05-20
Darpan Basnet
👨💻 Summary
Security Analyst with hands-on experience in detection engineering, threat modeling, and threat intelligence integration. Skilled in analyzing network and host-based security events, and incident response. Proficient in MITRE ATT&CK and TTP-based threat modeling, scripting, and vulnerability management. Currently pursuing a B.S. in Cyber Operations at Dakota State University.
🎓 Education
Dakota State University — Madison, SD
B.S. in Cyber Operations
January 2024 – Present
💼 Work Experience
Security Analyst
Dakota State University, Madison, SD
March 2024 – Present
- Optimized Elastic Stack SIEM for diverse log sources, reducing false positives and enhancing enterprise detection.
- Built automated detection logic leveraging threat intelligence and TTP-based threat modeling.
- Conducted threat modeling using MITRE ATT&CK to improve response workflows.
- Prioritized remediation using a custom risk scoring system (CVSS, SSVC, EPSS, CKEV).
- Analyzed high-severity alerts in Microsoft Defender, supporting incident escalation and response.
- Delivered incident response support across cross-functional teams.
🛠️ Skills
Detection & Response: Elastic Stack, Microsoft Defender, Threat Modeling, TTP Analysis
Automation & Scripting: Python, Bash, PowerShell, Power Automate
Security Architecture: MITRE ATT&CK, Diamond Model
Systems & Networking: Linux, Windows, macOS, TCP/IP
Vulnerability Management: NESSUS, CVSS, SSVC, EPSS, CKEV, Compliance Tracking
Threat Intel & Hunting: Anomaly Detection, Threat Cluster Tracking
Tools: Wireshark, Snort, Suricata, Kibana, Burp Suite, Hashcat, Metasploit, GitHub, Nmap, Hydra, ffuf, Security Scorecard
🎯 Certifications
- Hack The Box CPTS (in progress)
- CompTIA Security+ (in progress)
⚡ Activities & Projects
- CTF Club Leader: Organized weekly CTFs and cybersecurity discussions.
- Competitions: CPTC, NSA Codebreaker Challenge 2024, Hivestorm.
- Home Lab:
- Built a SIEM environment using Elastic Stack and Security Onion.
- Developed AD pentesting lab using Kali, Windows Server, and Windows 11.
- Practicing Detection-as-Code and automation pipelines.
📚 Coursework
- Computer Science II (CSC 250)
- Data Structures & Algorithms (CSC 300)
- Assembly Language x86/x86_64 (CSC 314)
- Reverse Engineering (CSC 428)
- Networking I & II (CSC 285, CSC 385)