Back to Developers
KK

Krithika Krithika

Cybersecurity professional

Mangalore, India
69
Profile Score

About

Aspiring Cybersecurity professional with foundational knowledge in Security Operations, Threat Detection, and Incident Response. Familiar with SIEM tools, network monitoring, and log analysis, with hands-on exposure to firewalls, antivirus, and vulnerability assessment.

Skills & Expertise (5)

Threat Detection Incident Response Malware Analysis Cyber Laws Cryptography

Work Experience

Intern

Cyber Economic and Narcotics Crime Police Station

08-2024 - Present

Assisted in data analysis for cybercrime investigation. Gained insights into law enforcement procedures related to cybercrime.

Cybersecurity Intern

Manipal Technologies Limited

04-2025 - 08-2025

Investigated and analyzed antivirus alerts from Sophos and SOC alerts on the Seceon SIEM platform, reducing repetitive alerts and assessing external IP threats. Designed LAN network architecture and configured secure remote access with PuTTY. Reviewed firewall configuration files to identify security gaps. Performed VAPT on web applications using Burp Suite, OWASP ZAP, and manual testing. Conducted IP scanning with Nessus and performed OSINT investigations, documenting critical security findings.

Education

Master of Science in Cybersecurity

2023 - 2025 · India

Bachelor of Science in Physics, Chemistry, Mathematics

2019 - 2022 · India

Certifications

An insight into Cybersecurity and Intellectual Property Rights

AICTE ATAL academy · 2024

Participated in 12-day workshop

Cyber Security and Ethical Hacking

Lesrd Security Academy · 2024

Completed 15-day webinar and practical workshop

Interested in this developer?

Profile Score Breakdown

📷 Photo 0/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 10/20
🎓 Education 10/10
⏱️ Experience 9/15
💰 Rate 0/5
🏆 Certs 5/5
Verified 5/5
Total Score 69/100

Profile Overview

Member sinceSep 2025

Availability Details

Visa Status

No Visa

Relocation

Open to Relocation

Skills (5)

Threat Detection Incident Response Malware Analysis Cyber Laws Cryptography