Skip to content
View chaitanyakrishna's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report chaitanyakrishna

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
chaitanyakrishna/README.md

Profile view counter on GitHub GitHub LinkedIn Email Website

Hi, I’m Chaitanya 👋

I work in cybersecurity, focusing on incident response, threat intelligence, and security automation.

I currently work at Microsoft, where I’m part of a global team handling large-scale security incidents and containment across first-party infrastructure. Most of my day-to-day work is about understanding attacker behavior, reducing response time, and building automation that helps teams move faster during incidents.

What I work on

  • Investigating and responding to security incidents at enterprise scale
  • Threat actor containment and remediation
  • Turning threat intelligence into detections and response actions
  • Building automation and SOAR workflows to reduce manual response
  • Improving SOC processes through use cases, playbooks, and tooling

I enjoy work that blends security engineering and operations, especially where reliability and clarity matter more than tooling.

Open-source projects

I build tools when something feels repetitive, slow, or error-prone.

🔹 IOC Scraper

Automates extraction and normalization of indicators of compromise from blogs, PDFs, CSVs, and reports.

  • Supports IPs, domains, URLs, hashes, YARA rules, and MITRE ATT&CK IDs
  • Defanging and basic whitelisting included
  • Designed to fit into real threat-intelligence workflows

➡️ https://github.com/chaitanyakrishna/iocscraper

🔹 Threat Feed Automator

Collects domains and IP addresses from multiple threat feeds for enrichment and analysis.

➡️ https://github.com/chaitanyakrishna/ThreatFeedAutomater

🔹 Subdomain Enumerator

Lightweight script for enumerating subdomains using the SecurityTrails API.

➡️ https://github.com/chaitanyakrishna/subdomain-enum

🔹 Ginger-Chai

Helps identify static and dynamic pages in web applications to assist with assessment scoping.

➡️ https://github.com/chaitanyakrishna/Ginger-Chai

Technical areas I spend time in

  • Incident response & threat containment
  • Cyber threat intelligence (strategic, operational, tactical)
  • SOAR & security automation (Python, PowerShell)
  • Detection engineering & MITRE ATT&CK mapping
  • Cloud security (Azure, AWS, GCP)
  • SIEM, EDR, and telemetry-driven investigations

I care more about how systems fail under pressure than perfect architectures.

Teaching & sharing

  • Created a beginner-friendly Penetration Testing with Metasploit course
  • Delivered talks and internal sessions on offensive and defensive security topics
  • Built hands-on virtual labs for realistic security training

Teaching forces clarity — and security needs more of that.

Get in touch

  • GitHub
  • LinkedIn
  • Email
  • Website

Thanks for stopping by 🙂

Pinned Loading

  1. IOCScraper IOCScraper Public

    IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.

    Python 36 6

  2. YaraIOCDownloader YaraIOCDownloader Public

    This script will download IOCs based on the rule name defined in Yara rules and leverages abuse.ch API service to fetch the IOCs

    Python

  3. subdomain-enum subdomain-enum Public

    Subdomain Enumeration using Securitytrails API

    Python 27 5

  4. ThreatFeedAutomater ThreatFeedAutomater Public

    Following script ingests the Threat Intel Feeds from input url list. Current script can fetch domains and IP Addresses.

    Shell

  5. Ginger-Chai Ginger-Chai Public

    Ginger Chai crawls static and dynamic links provided within given url

    JavaScript 1