About
I am an Entry-level Cybersecurity Analyst with a strong background in RF testing, network protocols, and system diagnostics. I am proficient in threat detection, vulnerability assessment, and incident response using tools such as Wireshark, Nmap, and Kali Linux. Certified in Cybersecurity, with practical experience in SIEM platforms (e.g. Splunk, Chronicle), Python scripting, and penetration testing. I have strong analytical and technical skills with a focus on securing digital systems and mitigating evolving cyber threats.
Skills & Expertise (14)
Work Experience
Contract Engineer
Research Centre Imarat (RCI)
Jan-2023 - Present
Experienced with Pathwave SystemVue for RF circuit design and analysis, focusing on network security and system security design to identify vulnerabilities and optimize secure communication systems. Proficient in RF testing and transceiver measurement, with expertise in identifying system vulnerabilities to enhance overall network security and system posture. Strong in technical troubleshooting, with a proven ability to identify and mitigate cybersecurity threats, improving system resilience and security integrity.
Intern
Supraja Technologies
Aug-2020 - Sep-2020
Hands-on experience with ethical hacking, penetration testing, and vulnerability exploitation techniques. Proficient in using Nmap, Angry IP Scanner, and VirtualBox for network scanning, vulnerability assessment, and penetration testing. Skilled in identifying and mitigating network vulnerabilities and security threats.
Education
Intermediate (M.P.C)
2017 - 2021 · India
Certifications
Google Cybersecurity Professional Certificate
Coursera · 2025
Proficient in risk assessment, CIA Triad, and cybersecurity frameworks such as NIST and ISO 27001. Skilled in incident response and hands-on with SIEM tools (e.g., Splunk, Chronicle); developed security playbooks. Strong knowledge of network security: TCP/IP, VPNs, firewall management, and secure network design principles. Expertise in Linux CLI, SQL, and secure data management practices. Experienced with threat modeling, penetration testing, and conducting vulnerability assessments.
SIEM Splunk Hands-On Guide Specialization Certificate
Coursera · 2025
Configured and deployed Splunk SIEM for log ingestion and real-time monitoring. Created SPL queries for security event detection, incident analysis, and threat identification. Developed custom dashboards and alerts for real-time threat visibility and proactive security monitoring. Conducted threat hunting and incident response using Splunk to identify and mitigate potential threats. Parsed and normalized logs from firewalls, IDS/IPS, and endpoints for centralized security analysis.