A technically minded and talented individual with strong knowledge and the ability to provide technical direction in systems development, integration, and testing. I am willing to take ownership of issues until they are fully resolved and am committed to my own continuous education, certification, and self-improvement. I am a fully qualified professional with extensive hands-on knowledge of Penetration Testing, Risk Management, Cloud Services, Embedded Systems, IoT, and Cybersecurity. I am an expert at managing a system's stability, operation, security, and scalability. In the past, I have worked in large, complex computing environments where I led and motivated a team of engineers and technicians. I have been certified as an AWS Solution Architect SAC003 and a Member of ISC2. I am also Certified eJPT (Elearning Penetration Testing) and preparing for OSCP (Offensive Security Certified Professional Certification). View my Blog on Medium: https://medium.com/@srisowmya.nemani
Developed comprehensive dashboards, alerts, and reports in SIEM for enhanced security monitoring and analysis. Assisted in analyzing and responding to alerts generated by EDR tools such as Sophos and vulnerability scanners like Tenable. Supported the security team in maintaining up-to-date security dashboards and reports. Collaborated with senior analysts to investigate and respond to security incidents.
Proficient in utilizing SIEM to develop comprehensive dashboards, alerts, and reports for enhanced security monitoring. Skilled in writing automated Python scripts for extracting data and uploading it to Splunk. Skillfully escalate complex security issues to SOC Analyst Tier 2 for further investigation, leveraging expertise in EDR Sophos and vulnerability scanner Tenable.
Identified, mitigated, tested, remediated and documented top 10 vulnerabilities using Qualys, ensuring system security. Enhanced application security with CyberArk EPM by implementing whitelist and blocklist policies. Automated it with REST API calls to ensure policy compliance and functionality. Worked with a cross-functional team to detect and mitigate over 20 malicious alerts using Darktrace SIEM, ensuring swift incident response and threat neutralization. Improved security scores by 4% through third-party vulnerability management using Security Scorecard and Bitsight.
Spearheaded over 50 STEM projects employing Finch and Hummingbird bit technologies, resulting in the creation of groundbreaking healthcare and disability models. Led precise data collection, analysis, and interpretation, ensuring project success. Evaluated GenAI's influence on B2B and B2C marketing tactics for Fortune 100 companies. Analyzed ESG practices in Fortune 500 companies, boosting research depth and accuracy.
Served the Government of Telangana – Telangana State Police to assist them in extracting data from seized digital devices. Tested and documented different types of tools related to Mobile Forensics, Network Forensics, OSINT, Disk Forensics, and more.
Snort monitors network traffic for suspicious activity and generates alerts when potential security threats are detected. Snort is open-source, highly customizable, and widely used in both small and large-scale network environments for enhancing network security. By regularly monitoring network traffic and responding to alerts generated by Snort, network administrators can quickly identify and respond to potential security threats before they cause significant damage to the network.
The hand gesture home automation for the visually challenged is an embedded design project in three steps. The first module uses a sensor to capture the motion of the visually challenged, and the controller (Arduino) takes input and controls the output to the motor attached to home appliances like fans, drapes, air conditioners, etc. This project focuses on enabling home electronic devices to be controlled by hand gestures.
This project is designed to secure information by data hiding during exchange over the internet. The encryption method used is based on the Rubik’s cube principle. Using MATLAB, the code for this project jumbles secret image pixels according to the Rubik’s cube principle, hides them under a cover image, and sends them to the destination.