About
Highly driven Security Engineer specializing in Secured Infrastructure, Incident Response, and Security Automation. Proven expert in managing enterprise-grade security operations, enforcing compliance baselines through Infrastructure as Code (SaltStack), and automating repetitive SOC tasks with Python, PowerShell, and RESTful APIs. Adept at rapid incident triage and troubleshooting complex OSI Layer 2-7 network anomalies across virtualized and AWS cloud environments, consistently resolving high-priority incidents and streamlining cybersecurity service onboarding.
Work
THIRU (Threat Incident and Response Unit)
|Security Engineer
Melbourne, Victoria, Australia
→
Summary
Led security engineering initiatives within the Threat Incident and Response Unit, focusing on incident resolution, security automation, and infrastructure defense across diverse environments.
Highlights
Resolved 100% of complex VPN routing drops, ARP loops, and Docker/16 subnet IP collisions by utilizing network analysis tools (tcpdump/Wireshark) for rapid Layer 2-7 traffic analysis.
Managed enterprise security controls and enforced compliance baselines using SaltStack, pushing automated remediation commands to 1,000+ global endpoints 10x faster than traditional methods.
Engineered an automated Threat Detection and Response (TDR) pipeline with Python and PowerShell, querying SIEM REST APIs every 60 seconds to reduce Mean Time to Detect (MTTD) to <1 minute for fileless malware alerts.
Executed remote onboarding and deployment of Elastic Agent security services across 40+ corporate devices for a healthcare client, ensuring immediate infrastructure visibility without business disruption.
Engineered a custom Python/Flask backend, integrating a 30+ node deception network (T-Pot) with the central SIEM to streamline 1,000+ weekly threat indicators for enhanced automated intelligence.
Monash University
|Cybersecurity Project Lead
Melbourne, Victoria, Australia
→
Summary
Orchestrated a comprehensive cybersecurity project, leading penetration testing, vulnerability remediation, and secure network design for a university's web applications and infrastructure.
Highlights
Led penetration testing for an in-house web application, identifying 20 vulnerabilities (6 critical) and reducing risk exposure by 40%.
Collaborated with IT and engineering teams to remediate 15 identified issues, accelerating the fix timeline by 2 weeks.
Deployed secure network design principles, including segmentation, DMZs, and VPNs, to fortify campus infrastructure against cyber threats.
Configured and managed IDS/IPS platforms (Snort, Suricata) for real-time traffic analysis and proactive threat response.
Internshala
|Ethical Hacking Intern
Gurgaon, Haryana, India
→
Summary
Conducted ethical hacking and vulnerability assessments for live business websites, significantly enhancing security posture and client relationships.
Highlights
Detected and remediated critical vulnerabilities in live business websites, improving overall security posture by 30%.
Performed manual and automated penetration testing using Burp Suite and OWASP ZAP, identifying critical flaws like SQLi and XSS.
Developed Python scripts to automate security scanning and reporting, enhancing efficiency and consistency in vulnerability management.
Communicated detailed remediation plans to development teams via email and Slack, strengthening client relationships and ensuring timely fixes.
Verzeo & MVARO
|Cybersecurity Intern
Bangalore, Karnataka, India
→
Summary
Executed vulnerability assessments and threat detection, contributing to enhanced network security and client reporting for web and network systems.
Highlights
Implemented comprehensive vulnerability assessments for web and network systems, identifying and tracking 15 weaknesses to reduce reportable threats by 25%.
Utilized IDS/IPS and SIEM tools for effective threat detection and event management, ensuring proactive security monitoring.
Prepared and presented professional-grade technical documentation and client-facing reports, facilitating informed decision-making.
Collaborated on network security protocol deployment and updated firewall rules to strengthen system defenses.
Education
Jain University
Bachelor
Computer Applications
Monash University
→
Master
Cybersecurity
Languages
English
Certificates
Microsoft Certified: Security Operations Analyst (In Progress)
Issued By
Microsoft
Cisco CCNA (In Progress)
Issued By
Cisco
LinkedIn Learning – Azure for Architects (Networking Strategy)
Issued By
LinkedIn Learning
Ethical Hacking & Cybersecurity Fundamentals
Skills
Penetration Testing
Kali Linux, Burp Suite, OWASP ZAP, Metasploit, Nmap, Vulnerability Assessment, Ethical Hacking.
Threat Detection & Response
IDS/IPS (Snort, Suricata), Log Analysis, Network Anomaly Detection, Threat Detection, Threat Response, Incident Response.
Web Security & Programming
Python, C, Bash, PowerShell, Flask, RESTful APIs, Secure Web Applications.
Cryptography & Data Protection
Encryption (AES, RSA), Public Key Infrastructure (PKI), Secure Certificate Management, Communications Integrity, Confidentiality, SSL/TLS, IPSec, HTTPS.
Network Security
TCP/IP, OSI Model, DNS, VLANs, VPNs, DMZ, NAT, Firewall Management, Network Design, Network Access Controls (NAC).
Cloud Security
AWS, Oracle Cloud, Authentication Protocols, EC2, RDS, RADIUS, TACACS+.
Automation & Infrastructure as Code
SaltStack, Security Automation, Scripting, Infrastructure as Code.
Reporting & Documentation
Technical Risk Reports, Client Documentation, Executive Presentations.
Soft Skills
Stakeholder Management, Clear Communication (Email, Slack, Video), Adaptability, Problem-Solving, Customer Communication, Collaboration.
Project Management
Project Leadership, Strategic Planning.
Security Operations & SIEM
SIEM Monitoring (ELK), Alert Investigation, Incident Triage, Threat Analysis, Phishing Analysis, Log Analysis, Security Monitoring.
Interests
Cybersecurity Community
Self-driven Technical Learning.
References
References
Available on request.