Skip to content
View SparshLadani's full-sized avatar
  • Dalhousie University
  • Halifax, Nova Scotia
  • 15:50 (UTC -03:00)
  • LinkedIn in/sparshladani

Highlights

  • Pro

Organizations

@DalCTF

Block or report SparshLadani

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
SparshLadani/README.md

Hi there! πŸ‘‹

πŸ‘¨β€πŸ’» Intro

I'm Sparsh Ladani. Final-year CS student at Dalhousie, concentrating in Cybersecurity, graduating August 2026. Currently interning as a Cybersecurity Intern at Thales.

πŸ’Ό Projects

1. Autonomous AI Threat Hunting Agent

An agent built on LangGraph and the OpenAI API that pulls from Elastic SIEM, detects APT29-style activity, and spits out a SOC-ready MITRE ATT&CK report in under a minute. The fun part was getting the agent to reason over alerts instead of just summarizing them.

2. Serverless AWS CloudTrail Threat Detection Pipeline

A fully serverless setup on AWS that monitors CloudTrail logs and flags suspicious API activity. No servers to babysit, which was kind of the point.

3. WannaCry Ransomware Homelab Analysis

I detonated WannaCry in an isolated homelab and dug into it with Autopsy, Volatility, and KQL. The writeup walks through the infection chain, what it touches on disk and in memory, and what you'd actually do to contain it.

πŸš€ Core Skills

Elastic SIEM, KQL, MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, NIST SP 800-61, Python, LangGraph, AWS Security, Active Directory, Suricata, Nessus, Burp Suite, Wireshark, Autopsy, Volatility.

πŸ”’ Certifications

CompTIA Security+, Microsoft Azure Fundamentals (AZ-900), ISC2 CC.

🌟 Achievements

  • Top 2% on TryHackMe (out of 3M+ users)
  • 15+ infosec blogs on Medium, 32K+ total views

πŸŒ€ Focus

I spend most of my time on threat hunting, detection engineering, and the security side of AI systems. The AI + security overlap is where I want to keep working and growing!

πŸ“« Let's Connect

If you want to talk detections, CTFs, or AI security, ping me on LinkedIn.

Pinned Loading

  1. Threat-Hunting-AI-Agent Threat-Hunting-AI-Agent Public

    Jupyter Notebook

  2. AWS-CloudTrail-Threat-Detection-Alerting-System AWS-CloudTrail-Threat-Detection-Alerting-System Public

  3. Vulnerability-Management Vulnerability-Management Public

    Here is the link for the associated blog: https://medium.com/@sparshladani/vulnerability-management-using-nessus-200b593fbf9a