Back to Developers
rohit yadav

rohit yadav

Cyber Security & Ethical Hacking Intern

Kolkata, India
80
Profile Score

About

Final-year B.Tech engineer with 5 months of hands-on cybersecurity internship experience in vulnerability assessment, Linux system administration, incident documentation, and security best practices. Strong understanding of networking concepts (TCP/IP, DNS, HTTP, Firewalls), common cyber threats (Malware, Phishing, Ransomware), and cybersecurity principles. Certified in Fortinet FCA & FCF, Cisco Cybersecurity, and Oracle Cloud Infrastructure. Familiar with SIEM concepts (actively learning Splunk/QRadar); proficient in Linux (Kali, Ubuntu) and Windows OS. Strong analytical, problem-solving, and documentation skills. Available immediately.

Skills & Expertise (73)

Cyber Threat Knowledge Beginner
6.4/10
0.5
Years Exp
Vulnerability Assessment Beginner
6.2/10
0.5
Years Exp
Security monitoring Beginner
6.1/10
0.5
Years Exp
SIEM tools Beginner
5.9/10
0.5
Years Exp
Log Analysis Beginner
5.8/10
0.5
Years Exp
Incident Response Beginner
5.7/10
0.5
Years Exp
Security Best Practices Beginner
5.7/10
0.5
Years Exp
Networking Fundamentals Beginner
5.6/10
0.5
Years Exp
Windows OS security basics escalation Documentation Incident detection log review Access Control User Management Audit trails System Hardening Permissions CLI Linux & Windows OS Pen testing basics Secure System Design Fortinet FCA/FCF certified Continuous Learning Communication Documentation Attention to Detail Problem-solving Analytical Thinking Oracle Cloud certified Cisco Cybersecurity certified RCA Secrets Management Least Privilege Authentication Encryption Runbooks Compliance Documentation Risk Assessment Security incident reports DNS malware Protocol understanding Port scanning basics Network Traffic Analysis LAN/WAN concepts VPN Firewalls HTTP/HTTPS Phishing TCP/IP Anomaly Identification Network activity review Firewall Logs System logs Suspicious activity detection Security Alert Monitoring OWASP concepts Ransomware Social Engineering DDoS Threat identification Attack Vectors CVE awareness Threat Intelligence Basics log correlation Alert Triage Event Analysis Splunk QRadar/Sentinel Vulnerability Scanning Security checks Kali linux tools

Work Experience

Industrial Trainee

WBSEDCL (West Bengal State Electricity Distribution Corp. Ltd.)

Jun 2025 - Jul 2025

Observed operational technology security practices; supported documentation of security-relevant workflows and system access procedures in a critical infrastructure environment.

Cyber Security & Ethical Hacking Intern

Ardent Computech Pvt. Ltd.

Aug 2025 - Dec 2025

Worked on Linux systems (Kali, Ubuntu) — managed user permissions, system configuration, and security hardening; reviewed system and firewall logs to identify suspicious behaviour and anomalies. Assisted in vulnerability assessments using industry tools — performed security checks, identified potential weaknesses, and documented findings with structured incident reports and remediation recommendations. Supported incident response activities — documented security incidents, maintained compliance and audit trail records, and collaborated with IT teams to implement security controls and best practices. Researched emerging cyber threats including Malware, Phishing, and Ransomware; stayed updated on security trends and contributed threat intelligence findings to the team's knowledge base.

Education

B.Tech – Electrical Engineering - B.P. Poddar Institute of Management and Technology

2022 - 2026 · Afghanistan

ISC Class XII - The Central Modern School

2021 - 2022 · Afghanistan

ICSE Class X - The Central Modern School

2019 - 2020 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (73)

Cyber Threat Knowledge Vulnerability Assessment Security monitoring SIEM tools Log Analysis Incident Response Security Best Practices Networking Fundamentals Windows OS security basics escalation +63 more