Sourav Ramakrishna

Security Engineer | Incident Response & Automation Specialist
Melbourne, AU.

About

Highly driven Security Engineer specializing in Secured Infrastructure, Incident Response, and Security Automation. Proven expert in managing enterprise-grade security operations, enforcing compliance baselines through Infrastructure as Code (SaltStack), and automating repetitive SOC tasks with Python, PowerShell, and RESTful APIs. Adept at rapid incident triage and troubleshooting complex OSI Layer 2-7 network anomalies across virtualized and AWS cloud environments, consistently resolving high-priority incidents and streamlining cybersecurity service onboarding.

Work

THIRU (Threat Incident and Response Unit)
|

Security Engineer

Melbourne, Victoria, Australia

Summary

Led security engineering initiatives within the Threat Incident and Response Unit, focusing on incident resolution, security automation, and infrastructure defense across diverse environments.

Highlights

Resolved 100% of complex VPN routing drops, ARP loops, and Docker/16 subnet IP collisions by utilizing network analysis tools (tcpdump/Wireshark) for rapid Layer 2-7 traffic analysis.

Managed enterprise security controls and enforced compliance baselines using SaltStack, pushing automated remediation commands to 1,000+ global endpoints 10x faster than traditional methods.

Engineered an automated Threat Detection and Response (TDR) pipeline with Python and PowerShell, querying SIEM REST APIs every 60 seconds to reduce Mean Time to Detect (MTTD) to <1 minute for fileless malware alerts.

Executed remote onboarding and deployment of Elastic Agent security services across 40+ corporate devices for a healthcare client, ensuring immediate infrastructure visibility without business disruption.

Engineered a custom Python/Flask backend, integrating a 30+ node deception network (T-Pot) with the central SIEM to streamline 1,000+ weekly threat indicators for enhanced automated intelligence.

Monash University
|

Cybersecurity Project Lead

Melbourne, Victoria, Australia

Summary

Orchestrated a comprehensive cybersecurity project, leading penetration testing, vulnerability remediation, and secure network design for a university's web applications and infrastructure.

Highlights

Led penetration testing for an in-house web application, identifying 20 vulnerabilities (6 critical) and reducing risk exposure by 40%.

Collaborated with IT and engineering teams to remediate 15 identified issues, accelerating the fix timeline by 2 weeks.

Deployed secure network design principles, including segmentation, DMZs, and VPNs, to fortify campus infrastructure against cyber threats.

Configured and managed IDS/IPS platforms (Snort, Suricata) for real-time traffic analysis and proactive threat response.

Internshala
|

Ethical Hacking Intern

Gurgaon, Haryana, India

Summary

Conducted ethical hacking and vulnerability assessments for live business websites, significantly enhancing security posture and client relationships.

Highlights

Detected and remediated critical vulnerabilities in live business websites, improving overall security posture by 30%.

Performed manual and automated penetration testing using Burp Suite and OWASP ZAP, identifying critical flaws like SQLi and XSS.

Developed Python scripts to automate security scanning and reporting, enhancing efficiency and consistency in vulnerability management.

Communicated detailed remediation plans to development teams via email and Slack, strengthening client relationships and ensuring timely fixes.

Verzeo & MVARO
|

Cybersecurity Intern

Bangalore, Karnataka, India

Summary

Executed vulnerability assessments and threat detection, contributing to enhanced network security and client reporting for web and network systems.

Highlights

Implemented comprehensive vulnerability assessments for web and network systems, identifying and tracking 15 weaknesses to reduce reportable threats by 25%.

Utilized IDS/IPS and SIEM tools for effective threat detection and event management, ensuring proactive security monitoring.

Prepared and presented professional-grade technical documentation and client-facing reports, facilitating informed decision-making.

Collaborated on network security protocol deployment and updated firewall rules to strengthen system defenses.

Education

Jain University
Bangalore, Karnataka, India

Bachelor

Computer Applications

Monash University
Melbourne, Victoria, Australia

Master

Cybersecurity

Languages

English

Certificates

Microsoft Certified: Security Operations Analyst (In Progress)

Issued By

Microsoft

Cisco CCNA (In Progress)

Issued By

Cisco

LinkedIn Learning – Azure for Architects (Networking Strategy)

Issued By

LinkedIn Learning

Ethical Hacking & Cybersecurity Fundamentals

Skills

Penetration Testing

Kali Linux, Burp Suite, OWASP ZAP, Metasploit, Nmap, Vulnerability Assessment, Ethical Hacking.

Threat Detection & Response

IDS/IPS (Snort, Suricata), Log Analysis, Network Anomaly Detection, Threat Detection, Threat Response, Incident Response.

Web Security & Programming

Python, C, Bash, PowerShell, Flask, RESTful APIs, Secure Web Applications.

Cryptography & Data Protection

Encryption (AES, RSA), Public Key Infrastructure (PKI), Secure Certificate Management, Communications Integrity, Confidentiality, SSL/TLS, IPSec, HTTPS.

Network Security

TCP/IP, OSI Model, DNS, VLANs, VPNs, DMZ, NAT, Firewall Management, Network Design, Network Access Controls (NAC).

Cloud Security

AWS, Oracle Cloud, Authentication Protocols, EC2, RDS, RADIUS, TACACS+.

Automation & Infrastructure as Code

SaltStack, Security Automation, Scripting, Infrastructure as Code.

Reporting & Documentation

Technical Risk Reports, Client Documentation, Executive Presentations.

Soft Skills

Stakeholder Management, Clear Communication (Email, Slack, Video), Adaptability, Problem-Solving, Customer Communication, Collaboration.

Project Management

Project Leadership, Strategic Planning.

Security Operations & SIEM

SIEM Monitoring (ELK), Alert Investigation, Incident Triage, Threat Analysis, Phishing Analysis, Log Analysis, Security Monitoring.

Interests

Cybersecurity Community

Self-driven Technical Learning.

References

References

Available on request.