I'm Sparsh Ladani. Final-year CS student at Dalhousie, concentrating in Cybersecurity, graduating August 2026. Currently interning as a Cybersecurity Intern at Thales.
An agent built on LangGraph and the OpenAI API that pulls from Elastic SIEM, detects APT29-style activity, and spits out a SOC-ready MITRE ATT&CK report in under a minute. The fun part was getting the agent to reason over alerts instead of just summarizing them.
A fully serverless setup on AWS that monitors CloudTrail logs and flags suspicious API activity. No servers to babysit, which was kind of the point.
I detonated WannaCry in an isolated homelab and dug into it with Autopsy, Volatility, and KQL. The writeup walks through the infection chain, what it touches on disk and in memory, and what you'd actually do to contain it.
Elastic SIEM, KQL, MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, NIST SP 800-61, Python, LangGraph, AWS Security, Active Directory, Suricata, Nessus, Burp Suite, Wireshark, Autopsy, Volatility.
CompTIA Security+, Microsoft Azure Fundamentals (AZ-900), ISC2 CC.
- Top 2% on TryHackMe (out of 3M+ users)
- 15+ infosec blogs on Medium, 32K+ total views
I spend most of my time on threat hunting, detection engineering, and the security side of AI systems. The AI + security overlap is where I want to keep working and growing!
If you want to talk detections, CTFs, or AI security, ping me on LinkedIn.
