Back to Developers
Suvidha Mellempuri

Suvidha Mellempuri

Cybersecurity professional

Hyderabad, India
85
Profile Score

About

Cybersecurity professional with hands-on digital forensics internship experience and practical knowledge in email phishing analysis, Business Email Compromise (BEC) investigations, security log analysis, and threat detection. Experienced in analyzing Microsoft 365 and Google Workspace logs, performing email forensics, and reconstructing incident timelines using MITRE ATT&CK and Cyber Kill Chain frameworks. Seeking entry-level opportunities in cybersecurity to contribute to security operations, threat monitoring, incident investigation, and digital forensics.

Skills & Expertise (27)

Phishing Investigation Advanced
8.1/10
1
Years Exp
Business Email Compromise (BEC) Advanced
8.0/10
1
Years Exp
Incident Response Lifecycle Advanced
7.9/10
1
Years Exp
Root Cause Analysis Advanced
7.8/10
1
Years Exp
IoC Identification Advanced
7.7/10
1
Years Exp
Cyber Kill Chain MITRE ATT&CK framework FTK Imager Magnet AXIOM X-Ways Forensics Time management Team Collaboration Attention to Detail Problem Solving Analytical Thinking Adaptability Python Network Protocols TCP/IP model OSI Model Windows Event Logs Azure AD Sign-in Logs Google Workspace Logs Microsoft 365 Security Logs SPF / DKIM / DMARC Validation Email Header Analysis Incident Timeline Reconstruction

Work Experience

Forensic Intern

Arete IR

May 2025 - Dec 2025

Investigated phishing and Business Email Compromise (BEC) cases by reviewing Microsoft 365 and Google Workspace audit, identity, and authentication logs to identify suspicious login activity, MFA failures, and signs of account compromise. Performed email forensic analysis on PST/Outlook exports using X-Ways Forensics, validating SPF, DKIM, and DMARC, reviewing message headers, and extracting IOCs to confirm spoofing, malicious senders, or unauthorized activity. Correlated logs from multiple sources—such as source IPs, geolocation data, user agents, and device details—to detect suspicious activity and identify potential lateral movement. Reconstructed incident timelines using MITRE ATT&CK and the Cyber Kill Chain to understand threat actor actions and outline their Tactics, Techniques, and Procedures (TTPs).

Education

Bachelor of Engineering, Computer Science and Engineering - QIS College of Engineering & Technology

- 2022 · Afghanistan

Certifications

Cybersecurity Fundamentals

Cisco · 2025

Python Programming

Vcube Solutions · 2024

Core Java

Frontlines Edutech (FLM) · 2023

Volunteer & Camp Participation

National Service Scheme (NSS) · 2021–2022

Ethical Hacking Workshop

· 2021

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 5/5
Verified 5/5
Total Score 85/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (27)

Phishing Investigation Business Email Compromise (BEC) Incident Response Lifecycle Root Cause Analysis IoC Identification Cyber Kill Chain MITRE ATT&CK framework FTK Imager Magnet AXIOM X-Ways Forensics +17 more