About

󰃭 2025-05-20

Darpan Basnet

👨‍💻 Summary

Security Analyst with hands-on experience in detection engineering, threat modeling, and threat intelligence integration. Skilled in analyzing network and host-based security events, and incident response. Proficient in MITRE ATT&CK and TTP-based threat modeling, scripting, and vulnerability management. Currently pursuing a B.S. in Cyber Operations at Dakota State University.


🎓 Education

Dakota State UniversityMadison, SD
B.S. in Cyber Operations
January 2024 – Present


💼 Work Experience

Security Analyst

Dakota State University, Madison, SD
March 2024 – Present

  • Optimized Elastic Stack SIEM for diverse log sources, reducing false positives and enhancing enterprise detection.
  • Built automated detection logic leveraging threat intelligence and TTP-based threat modeling.
  • Conducted threat modeling using MITRE ATT&CK to improve response workflows.
  • Prioritized remediation using a custom risk scoring system (CVSS, SSVC, EPSS, CKEV).
  • Analyzed high-severity alerts in Microsoft Defender, supporting incident escalation and response.
  • Delivered incident response support across cross-functional teams.

🛠️ Skills

Detection & Response: Elastic Stack, Microsoft Defender, Threat Modeling, TTP Analysis
Automation & Scripting: Python, Bash, PowerShell, Power Automate
Security Architecture: MITRE ATT&CK, Diamond Model
Systems & Networking: Linux, Windows, macOS, TCP/IP
Vulnerability Management: NESSUS, CVSS, SSVC, EPSS, CKEV, Compliance Tracking
Threat Intel & Hunting: Anomaly Detection, Threat Cluster Tracking
Tools: Wireshark, Snort, Suricata, Kibana, Burp Suite, Hashcat, Metasploit, GitHub, Nmap, Hydra, ffuf, Security Scorecard


🎯 Certifications

  • Hack The Box CPTS (in progress)
  • CompTIA Security+ (in progress)

⚡ Activities & Projects

  • CTF Club Leader: Organized weekly CTFs and cybersecurity discussions.
  • Competitions: CPTC, NSA Codebreaker Challenge 2024, Hivestorm.
  • Home Lab:
    • Built a SIEM environment using Elastic Stack and Security Onion.
    • Developed AD pentesting lab using Kali, Windows Server, and Windows 11.
    • Practicing Detection-as-Code and automation pipelines.

📚 Coursework

  • Computer Science II (CSC 250)
  • Data Structures & Algorithms (CSC 300)
  • Assembly Language x86/x86_64 (CSC 314)
  • Reverse Engineering (CSC 428)
  • Networking I & II (CSC 285, CSC 385)