Back to Developers
Saikumar Nagula

Saikumar Nagula

Cyber Security Consultant

80
Profile Score

About

Results-driven cybersecurity professional with 6+ years of experience in security consultation, risk assessment, threat analysis, and implementation of robust security protocols. Proven track record of driving impactful results in high-stakes environments through analytical thinking, strategic planning, and effective communication. Skilled in cybersecurity, physical security measures, and compliance with industry standards, with a strong focus on team collaboration and seamless integration with existing systems.

Skills & Expertise (139)

SIEM tools Expert
9.0/10
4
Years Exp
Intrusion Detection & Prevention System Expert
8.8/10
4
Years Exp
Vulnerability Scanning Expert
8.7/10
4
Years Exp
Splunk Advanced
8.6/10
4
Years Exp
Azure Sentinel Advanced
8.4/10
3
Years Exp
Suricata Snort QualysGuard Nessus Digital Forensics Autopsy Volatility Malware Analysis Tools PE Studio Any-run.io Pen Testing Tools Burp Suite OWASP ZAP Nmap WIRESHARK Policy Development IT Security Policies SOPs Project Management Agile Jira S-SDLC Cybersecurity Standards Iso NIST Cloud Security & Identity Management Microsoft Azure AWS Google Cloud Platform Identity and Access Management Role-based access control Privileged Identity Management Microsoft 365 security Regulatory Compliance HIPAA GDPR PCI DSS Security Frameworks MITRE ATT&CK Cyber Kill Chain Privacy Regulations CLOUD Act Operating System Windows IOS LINUX Post Exploitation Framework Metasploit Jira ServiceNow Business Intelligence Tools Power BI Tableau Python Bash PowerShell Network Security Design Access Control Management Application Security Security Information And Event Management Incident Logging Oversight Network Security Management Endpoint Protection Vulnerability Assessment Mobile device security patch management Two-Factor Authentication Disaster Recovery Planning Secure Coding Practices Port security knowledge Security Awareness Training Incursion Tracking Intrusion Detection Encryption Techniques Virtual Private Networks Process Isolation Secure network architecture SIEM Provider Management Identity and Access Management IP Addressing and Subnetting Incident Response Risk Assessment Multitasking abilities Reliability Critical thinking Excellent Communication Organizational Skills Team Collaboration active listening Effective Communication Decision-making Incident Investigation Adaptability and Flexibility Relationship building Task Prioritization Interpersonal skills Analytical Thinking Professionalism Interpersonal Communication Threat Intelligence Virtualization Security Social engineering prevention Security Awareness Training Incident Response IT Risk Management compliance management Network Security Encryption Technologies Report Generation Intrusion Detection Digital Forensics Disaster Recovery Planning Cybersecurity Expertise Malware Analysis Security Operations Threat Detection Security strategies Forensic Analysis Supply chain security Threat Management Risk Management Disaster Recovery INFOSEC Teamwork Threat Analysis Time management Problem-solving Time management abilities Decision-making Adaptability and Flexibility Attention to Detail Threat Intelligence Incident Management Vulnerability Management

Work Experience

Cyber Security Consultant

AMAZON

Feb 2019 - Present

Successfully executed security incident response and continuous monitoring activities while meeting defined SLAs. Maintained 24x7 on-call availability during high-severity incidents, collaborating with clients, internal teams, and third-party vendors for containment and recovery. Supported the SOC team by monitoring alerts and system logs, ensuring accurate detection, escalation, and resolution of security events. Conducted event correlation across host logs, firewall logs, IDS logs, and network traffic using SIEM tools and utilities like Nmap, Nessus, Wireshark, and TCPdump. Investigated phishing emails, malicious domains, and IPs using OSINT tools and recommended blocking or mitigation actions based on detailed analysis. Applied the MITRE ATT&CK framework for threat hunting and incident investigations to improve threat detection capabilities. Researched attack patterns, social engineering tactics, and fraud techniques to enhance the security team’s readiness. Demonstrated expertise in Active Directory, Kerberos, and PKI, and provided remediation strategies for IAM-related incidents. Utilized knowledge in authentication, endpoint security, firewalls, DAM, DLP, and IAM tools to secure enterprise systems. Conducted penetration tests using OWASP Top 10 methodology and tools such as Burp Suite and Metasploit to identify XSS, SQLi, CSRF, and other vulnerabilities. Identified and prioritized vulnerabilities based on SANS 25, client policies, and compliance needs. Performed vulnerability scans with Nessus and Qualys, led remediation efforts, and scheduled recurring assessments. Mentored new hires and aligned them with SOC protocols, boosting team capability and performance. Led a team of junior analysts in identifying, triaging, and responding to cybersecurity threats. Proactively detected and neutralized threats, ensuring high preparedness in live environments. Managed global accounts and security environments to maintain a strong security posture. Integrated new application security technologies to enhance threat prevention and detection. Assessed and improved cybersecurity policies based on industry standards and stakeholder expectations. Advised leadership on emerging threats and security technologies to support strategic planning. Applied knowledge of ISO 27001 and privacy regulations to guide compliance and risk decisions. Conducted research to identify risks and implemented infrastructure security solutions. Delivered in-depth security assessments and enforced ethical practices to protect client networks. Performed risk assessments and updated SSPs in line with NIST 800-18 guidelines. Optimized cybersecurity resource utilization, improving operational cost-effectiveness. Strengthened client engagement through accurate, consistent threat reports and remediation updates. Analyzed security incidents post-resolution and recommended improvements to technical and procedural controls. Reduced cyberattack risk through ongoing vulnerability management and penetration testing. Conducted periodic reviews of user access rights to reduce insider threat risk. Performed detailed risk analyses and implemented security controls to minimize attack surfaces. Automated threat detection with real-time tools, improving efficiency in monitoring operations. Developed and maintained playbooks for common attack scenarios to reduce incident response time. Recommended architectural improvements to enhance security posture across systems and processes. Created technical plans to safeguard sensitive data from unauthorized access or modification. Led tabletop exercises simulating cyberattacks to improve team readiness and incident handling. Built and implemented an enterprise-wide Incident Response Plan to streamline major event handling. Ensured audit readiness and regulatory compliance through internal reviews and remediation efforts. Deployed advanced threat prevention and detection technologies to reinforce IT infrastructure. Worked with cross-functional teams to implement standardized information security procedures. Applied CIS benchmarks to evaluate and improve the security of systems and configurations.

Education

BSC (Statistics and Mathematics) - Sree Chaitanya Degree

- 2019 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceFeb 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (139)

SIEM tools Intrusion Detection & Prevention System Vulnerability Scanning Splunk Azure Sentinel Suricata Snort QualysGuard Nessus Digital Forensics +129 more