Neelesh Purohit

Cyber Intelligence, Defence & National Security Geek, Investigation Professional, Newsmaker, IT Consultant,

My Track Record

Cases Investigated

200+

Offenders Arrested

50+

Happy Clients

9+

Awards Won

4

OnSite Forensic Recovery

7+

Malware Analyzed

15+

Web & App Built

25+

UAV Flights

300+

Focused on...

Core Focus

Counter Intelligence & Anti Terrorism

Counterterrorism, also known as anti-terrorism, incorporates the practice, military tactics, techniques, and strategy that government, military, law enforcement, and intelligence agencies use to combat or prevent terrorism

Cyber Intelligence & Threat Assessment

Cyber intelligence is knowledge, skills and experience-based information concerning the occurrence and assessment of both cyber and physical threats and threat actors that is intended to help mitigate potential attacks and harmful events occurring in cyberspace

Cyber Training & Threat Investigation

Threat investigation and digital forensics is the process of gathering evidence related to a flagged threat to validate the alert and inform response and recovery activities.

Social Media Monitoring

Image result for social media monitoring Social media monitoring is the process of listening out for social media conversations that are relevant to your brand. ... To “listen”, businesses use social media monitoring tools to collect social mentions and track keywords, hashtags, and URLs that they are interested in

Open Source Intelligence

OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified, unclassified, or proprietary intelligence requirements across the previous intelligence disciplines

Digital Forensics

Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime

Secondary Focus

Cyber Security & Ethical Hacking

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide

Satellite Imageries & Geospatial Analysis

Geospatial analysis is the gathering, display, and manipulation of imagery, GPS, satellite photography and historical data, described explicitly in terms of geographic coordinates or implicitly, in terms of a street address, postal code, or forest stand identifier as they are applied to geographic models.

Drone photography

Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.

Web & App Development

A web application is application software that runs on a web server, unlike computer-based software programs that are run locally on the operating system of the device. Web applications are accessed by the user through a web browser with an active network connection.

Cloud Service Management

Cloud Service Management and Operations entails all the activities that an organization does to plan, design, deliver, operate, and control the IT and cloud services that it offers to customers. Service management includes the operational aspects of your applications and services

My services went to