Summary
Overview
Work History
Education
Skills
Certification
Websites
Research Project in Master's
Professional Interests
Networking Concepts & Practical Skills
Course: SC-200: Microsoft Security Operations Analyst (Completed on Udemy)
Timeline
Generic

Raghuram Varma Dandu

Cedar Park,TX

Summary

Detail-oriented and proactive IT professional with a solid foundation in document management, database operations, and Level-2 application support. Skilled in processing and managing high-volume data ingestion, SQL querying, and Unix server operations, with a proven ability to troubleshoot system alerts and optimize workflows to drive operational efficiency. Experienced in documentation, knowledge management, and training new team members. Adept at collaborating with cross-functional teams to ensure data integrity, validate system changes, and maintain seamless application performance. Recently completed a master’s degree in Information Technology and Management, with a deep interest in network security and cybersecurity. Passionate about securing digital infrastructures, enhancing system performance, and leveraging technical expertise to solve complex challenges. Actively seeking opportunities in cybersecurity and network security roles to further contribute to securing digital environments.

Overview

1
1
year of professional experience
1
1
Certification

Work History

JR. SOFTWARE ENGINEER

Cognizant
Hyderabad, India, Telangana
01.2022 - 02.2023
  • Processed documents from Document Management and Imaging (DMI) through different channels of ingestion and committing them to the Content Management platform, which acts as the source from which the end user can view unique documents.
  • Maintained knowledge of the database by documenting frequent issues and workarounds for resolution at the first line, and in creating knowledge articles on DMI.
  • Closely monitoring alerts from DMI that could cause a potential outage by deeply analyzing them and working on them before they could even cause an outage.
  • Worked on faxes from downstream applications by processing faxes with the help of SQL queries and checking the status of faxes until they were received at the receiver's end.
  • Prepared a standard operating procedure regarding faxes from downstream applications, having multiple scenarios with SQL queries, and sharing with onshore and offshore teams.
  • Worked on High Processing Imaging Ingestion (HPII) requests by checking whether the batch was committed into Filenet or not, by checking the status of the batch in the Unix server in order to avoid duplicate submission of requests into Filenet, and updating them using SQL queries while checking for successful callbacks.
  • Supported multiple applications, like Directscan, Datacap, and Fairfax, by documenting their tools and services, and giving training regarding them to new team members.
  • The frontrunner for validating changes in the application involves checking all health checks of the application, reviewing the processing flow of requests in the database, and closely monitoring the processing rate of files to avoid file pile-up due to changes in the application.
  • Technical Consultant for Application Maintenance.
  • Application Subject Matter Expert.

Education

Master of Arts - Information Technology

Webster University
San Antonio, TX
03-2025

Bachelor of Science - ECE

M V G R College of Engineering
Vizianagaram
01.2019

Skills

  • Document Management & Imaging (DMI)
  • SQL and Database Management
  • Linux/Windows Server Administration
  • Unix server operations
  • Incident Monitoring and Alert Handling
  • Documentation and Knowledge Management
  • Application Support and Maintenance
  • Change Management and Validation
  • Azure Sentinel
  • Kusto Query Language (KQL)
  • TCP/IP, DNS, DHCP, VPN
  • VLANs and subnetting
  • LAN/WAN technologies
  • Network analysis using Wireshark
  • Cisco networking: switching, routing, and ACLs
  • Routing protocols (OSPF, EIGRP, BGP, RIP)
  • Network troubleshooting
  • Security Event Supervision
  • Database management
  • Threat detection
  • Incident response
  • Identity and Access Management (IAM)
  • SOC Monitoring and Alert Triage
  • Log Analysis and Log Correlation

Certification

Cybersecurity Associate - SOC Analyst By U.S. Council

Certificate Number: USC00015749

Issued Date: 15th December 2024

ISC2 Certified in Cybersecurity (CC)

In Progress, Exam Scheduled April 2025

Comptia Security+ (SYO-701)

In Progress, Exam Scheduled May 2025

Research Project in Master's

Research Project: Network Security & Cryptography - Network Segmentation and Digital Signatures

  • Network Segmentation: Secured networks with VLANs, PVLANs, and access controls; explored PEP and PDP roles.
  • Zero-Trust Architecture: Implemented segmentation to mitigate unauthorized access risks.
  • Encryption: Studied AES (symmetric) and RSA, ECC (asymmetric) for secure key transfer.
  • Digital Signatures in Blockchain: Ensured non-repudiation and integrity via digital signatures, hash functions, and public-key security. Prevented data modification with Merkle Trees, Block Hash Integrity, and Consensus Mechanism Rejection.

Professional Interests

  • Passionate about Cybersecurity with a strong focus on Security Operations Center (SOC) analysis, threat detection, and incident response.
  • Continuously exploring advancements in SIEM tools, threat intelligence.

Networking Concepts & Practical Skills

  • Subnetting Mastery – Efficiently designed and segmented networks to optimize performance and security while minimizing IP address wastage.
  • Switching Techniques – Gained in-depth knowledge of VLANs for network segmentation, Trunking for efficient inter-switch communication, and Spanning Tree Protocol (STP) to prevent loops in complex network topologies.
  • VTP (VLAN Trunking Protocol) – Learned how VTP simplifies VLAN management across multiple switches, reducing administrative overhead and ensuring consistency.
  • Routing Protocols – Developed expertise in configuring and optimizing RIP, EIGRP, OSPF, and BGP for efficient network communication and dynamic routing.
  • Network Security Awareness – Understood the role of network segmentation, ACLs, and best practices in securing enterprise networks.
  • Hands-on Troubleshooting – Learned how to diagnose and resolve common networking issues related to misconfigurations, routing errors.

Course: SC-200: Microsoft Security Operations Analyst (Completed on Udemy)

  • Defined and leveraged Microsoft Defender for Endpoint capabilities to secure endpoints and manage risks.
  • Conducted threat hunting and investigated potential security threats within the network.
  • Utilized Defender for Endpoint to remediate vulnerabilities and ensure optimal security settings.
  • Onboarded and monitored devices for real-time threat detection and incident response.
  • Configured and customized Defender for Endpoint settings to align with organizational security needs.
  • Investigated and resolved incidents and alerts, ensuring rapid identification of threats.
  • Performed advanced hunting and created KQL queries for in-depth security analysis.
  • Managed indicators and tracked emerging threats, proactively addressing evolving risks.
  • Applied Threat and Vulnerability Management to identify and remediate device vulnerabilities.

Timeline

JR. SOFTWARE ENGINEER

Cognizant
01.2022 - 02.2023

Master of Arts - Information Technology

Webster University

Bachelor of Science - ECE

M V G R College of Engineering
Raghuram Varma Dandu