Summary
Education
Skills
PROJECT - SENTIMENTAL ANALYSIS ON TWITTER DATABASE
Timeline
Generic

SRIRAM PULIPAKA

Summary

With my Bachelor of Science in Computer Science Engineering, I have a strong background in data structures, networks, programming, and system security. My academic experience has equipped me with the technical know-how necessary to assess and resolve intricate security issues.

I also studied international relations for a dual degree, which has provided me with a distinct viewpoint on the dynamics of cybersecurity on a worldwide scale. I now have a thorough awareness of nation-state and non-state actors' actions as well as geopolitical cyberthreats and how they affect the always changing cybersecurity environment.

I am actively developing my practical skills in threat hunting, malware analysis, penetration testing, and vulnerability assessment with a focus on cybersecurity. Additionally, I'm staying ahead of the curve by investigating the dangers associated with GENAI with my Bachelor of Science in Computer Science Engineering, I have a strong background in data structures, networks, programming, and system security. My academic experience has equipped me with the technical know-how necessary to assess and resolve intricate security issues.

I also studied international relations for a dual degree, which has provided me with a distinct viewpoint on the dynamics of cybersecurity on a worldwide scale. I now have a thorough awareness of nation-state and non-state actors' actions as well as geopolitical cyberthreats and how they affect the always changing cybersecurity environment.

I am actively developing my practical skills in threat hunting, malware analysis, penetration testing, and vulnerability assessment with a focus on cybersecurity. Additionally, I'm staying ahead of the curve by investigating the dangers associated with GENAI and artificial intelligence's wider effects on cybersecurity. I am knowledgeable about compliance frameworks and standards such as SOC 2, ISO 27001, and NIST, which are essential for upholding strong security procedures.

I have excellent programming skills in Python and Bash for automation and analysis, and I am technically adept with tools like Wireshark, Nessus, Metasploit, and Splunk. My ability to recognize and successfully address security flaws has been further improved by my studies in network defense, secure code, and cryptography.

I take great satisfaction in my ability to collaborate with others and speak clearly. Working with cross-functional teams to create security strategies and effectively handle issues is something I'm really good at as a team member.

I'm excited to contribute my technological expertise, global perspectives, and commitment to cybersecurity. I also look forward to talking about how my abilities fit the needs of any team.

Education

Masters - Cyber Security

Webster University
St. Louis, MO
05-2025

Skills

  • Vulnerability assessment
  • Access control
  • Network security
  • Threat intelligence
  • Privileged access management
  • Software vulnerability scanning

PROJECT - SENTIMENTAL ANALYSIS ON TWITTER DATABASE

Sentiment analysis on a Twitter database involves analyzing tweets to determine the sentiment expressed, such as positive, negative, or neutral. To do this project, start by collecting a dataset of tweets using tools like Twitter's API or pre-existing datasets. Next, preprocess the data to clean it—removing hashtags, links, special characters, and converting text to lowercase. Use Natural Language Processing (NLP) libraries such as NLTK, SpaCy, or TextBlob to tokenize the text and perform sentiment analysis. Machine learning models like Logistic Regression or advanced models like BERT can also be trained for greater accuracy. Finally, visualize the results using charts to show sentiment trends or patterns across the dataset.

Timeline

Masters - Cyber Security

Webster University
SRIRAM PULIPAKA