Cybersecurity professional with expertise in SOC operations, cloud security, and ethical hacking. Recognized for a practical, results-oriented approach to problem-solving and a commitment to continuous learning and adaptation in the face of evolving challenges. Proven ability to enhance security protocols and mitigate risks while collaborating effectively with cross-functional teams. Eager to leverage skills and knowledge in contributing to innovative security solutions within a fast-paced environment.
Conducting independent lab-based research in penetration testing, cloud security, and SOC workflows.
Exploring AWS security, IAM misconfigurations, vulnerability management, and open-source tools.
Preparing for additional certifications and staying sharp through hands-on projects and security communities.
Designed and executed incident response plans to mitigate the impact of successful cyber-attacks on organizational assets.
Implemented robust security protocols for protecting sensitive data and minimizing potential breaches.
Associate Security Analyst (Lab Work – Graduate Program)
University of Alabama at Birmingham
05.2023 - 06.2024
Led simulated penetration testing campaigns targeting misconfigured cloud assets and vulnerable web apps, using Kali Linux, Burp Suite, and AWS environments to assess and report risks.
Designed and executed ethical hacking scenarios leveraging tools like Metasploit, Nmap, and Hydra, focusing on real-world attack vectors including privilege escalation and credential harvesting.
Investigated simulated security incidents through log correlation, packet analysis, and forensic artifact review, using Wireshark, Splunk, and Volatility across Windows and Linux systems.
Collaborated with red and blue team participants to simulate full attack-defense cycles, improving incident detection and response metrics within structured lab environments.
Maintained and managed a lab toolkit including Nessus, OpenVAS, VMware, and custom Python scripts, supporting continuous security testing, automation, and environment readiness.
Security Engineer
Cognizant
11.2021 - 12.2022
Investigated and triaged security alerts in enterprise SOC environments using Splunk, QRadar, and Chronicle SIEM, performing root cause analysis to reduce false positives and escalate genuine threats.
Conducted vulnerability assessments and remediation validation across client infrastructure using Nessus, Qualys, and OpenVAS, contributing to measurable risk reduction.
Supported incident response workflows, analyzing malware indicators and phishing attempts with Kali Linux, Wireshark, and VirusTotal, and documenting findings for senior teams.
Automated repetitive SOC tasks with Python scripts, improving alert-handling efficiency and reducing mean-time-to-detect (MTTD).
Collaborated with cross-functional teams to implement security best practices, contributing to compliance initiatives aligned with ISO 27001 and HIPAA.
Security Engineer Intern
Cognizant
05.2021 - 11.2021
Shadowed senior SOC analysts in triage and escalation workflows, learning practical approaches to incident prioritization and communication.
Assisted in monitoring enterprise networks and endpoints through SIEM dashboards (Splunk, ArcSight), escalating suspicious events for deeper analysis.
Gained hands-on exposure to threat intelligence workflows, correlating indicators of compromise (IOCs) with external feeds and internal detection rules.
Participated in incident documentation by drafting initial playbooks and standard operating procedures for phishing, malware, and insider threat scenarios.
Conducted supervised basic vulnerability scans using Nessus Essentials and supported remediation efforts with patch management teams.
Education
Master's degree - Cybersecurity
University of Alabama At Birmingham
05.2024
Bachelor of Technology - BTech - Electronics and Computer Engineering