About
Experienced cybersecurity analyst with track record in identifying, analyzing and mitigating security risks across web applications. Skilled in penetration testing network traffic analysis and python scripting. Strong command of cybersecurity frameworks including OWASP top ten, NIST and CSF. Proficient with tools such as Wireshark, Nmap, Burp Suite, and Metasploit. Committed to protecting organizational assets through effective threat identification, risk assessment, and implementing robust security solutions. Seeking an opportunity to apply my skills to safeguard the organizational assets and mitigate security risks.
Skills & Expertise (30)
Work Experience
Cybersecurity Intern
The Red Users
2024-Present - Present
Performed vulnerability assessment and penetration testing on web application using Burp Suite, focusing on OWASP top 10 threats (SQL, XSS, CSRF). Simulated real world attack in a controlled lab environment and documented findings. Used Wireshark for network traffic monitoring and detection of anomalies. Built a virtual network lab with Cisco packet tracer to simulate firewall configuration and intrusion scenarios. Participated in weekly CTFs for continuous learning and skill development.
Software Engineer
Mphasis
2021-2024 - Present
Maintained and enhanced a Python-based Audit Management System, ensuring compliance with updated security and audit policies. Automated test cases and manual test workflows using Python, increasing QA efficiency by 80%. Developed scripts to test HP Applications and their integration with WeeChat across different platforms. Collaborated in cross-functional agile teams, utilizing Git and Jira for version control and project tracking.
Education
Bachelor's in Computer Science and Engineering
2020 - 2024 · India
Certifications
Google Cybersecurity Professional Certificate
Google · 2025
Covered threat modeling, risk management, SIEM tools, and compliance basics.
Network Security and Configuration (Cisco)
Credly · 2024
Hands-on experience configuring routers, firewalls, and analyzing packet flows.
Penetration Testing and Ethical Hacking
Cybrary · 2024
Used Nmap, Metasploit, and Wireshark in ethical hacking labs.