Close

Sri Sowmya Nemani

Cybersecurity Professional

About Me

A technically minded and talented individual with strong knowledge and the ability to provide technical direction in systems development, integration, and testing. I am willing to take ownership of issues until they are fully resolved and am committed to my own continuous education, certification, and self-improvement. I am a fully qualified professional with extensive hands-on knowledge of Penetration Testing, Risk Management, Cloud Services, Embedded Systems, IoT, and Cybersecurity. I am an expert at managing a system's stability, operation, security, and scalability. In the past, I have worked in large, complex computing environments where I led and motivated a team of engineers and technicians. I have been certified as an AWS Solution Architect SAC003 and a Member of ISC2. I am also Certified eJPT (Elearning Penetration Testing) and preparing for OSCP (Offensive Security Certified Professional Certification). View my Blog on Medium: https://medium.com/@srisowmya.nemani

UNLV Information Technology

Jr.Security Analyst

Developed comprehensive dashboards, alerts, and reports in SIEM for enhanced security monitoring and analysis. Assisted in analyzing and responding to alerts generated by EDR tools such as Sophos and vulnerability scanners like Tenable. Supported the security team in maintaining up-to-date security dashboards and reports. Collaborated with senior analysts to investigate and respond to security incidents.

UNLV Information Technology

Information Security Analyst Intern

Proficient in utilizing SIEM to develop comprehensive dashboards, alerts, and reports for enhanced security monitoring. Skilled in writing automated Python scripts for extracting data and uploading it to Splunk. Skillfully escalate complex security issues to SOC Analyst Tier 2 for further investigation, leveraging expertise in EDR Sophos and vulnerability scanner Tenable.

City of Las Vegas

IT Security Analyst Intern

Identified, mitigated, tested, remediated and documented top 10 vulnerabilities using Qualys, ensuring system security. Enhanced application security with CyberArk EPM by implementing whitelist and blocklist policies. Automated it with REST API calls to ensure policy compliance and functionality. Worked with a cross-functional team to detect and mitigate over 20 malicious alerts using Darktrace SIEM, ensuring swift incident response and threat neutralization. Improved security scores by 4% through third-party vulnerability management using Security Scorecard and Bitsight.

University of Nevada Las Vegas

Graduate Research Assistant

Spearheaded over 50 STEM projects employing Finch and Hummingbird bit technologies, resulting in the creation of groundbreaking healthcare and disability models. Led precise data collection, analysis, and interpretation, ensuring project success. Evaluated GenAI's influence on B2B and B2C marketing tactics for Fortune 100 companies. Analyzed ESG practices in Fortune 500 companies, boosting research depth and accuracy.

Zoom Cybersense

Digital Forensics Associate

Served the Government of Telangana – Telangana State Police to assist them in extracting data from seized digital devices. Tested and documented different types of tools related to Mobile Forensics, Network Forensics, OSINT, Disk Forensics, and more.

Education

University of Nevada Las Vegas

January 2023 - August 2024

Masters of Science in Cybersecurity

Projects

Network Monitoring system using Snort

Network Monitoring System Using Raspberry Pi and Snort

Snort monitors network traffic for suspicious activity and generates alerts when potential security threats are detected. Snort is open-source, highly customizable, and widely used in both small and large-scale network environments for enhancing network security. By regularly monitoring network traffic and responding to alerts generated by Snort, network administrators can quickly identify and respond to potential security threats before they cause significant damage to the network.

Hand Gesture Home Automation For Visually Challenged

Hand Gesture Home Automation for the Visually Challenged

The hand gesture home automation for the visually challenged is an embedded design project in three steps. The first module uses a sensor to capture the motion of the visually challenged, and the controller (Arduino) takes input and controls the output to the motor attached to home appliances like fans, drapes, air conditioners, etc. This project focuses on enabling home electronic devices to be controlled by hand gestures.

Digital Image Steganography with Encryption

Digital Image Steganography with Encryption Based on Rubik's Cube Principle

This project is designed to secure information by data hiding during exchange over the internet. The encryption method used is based on the Rubik’s cube principle. Using MATLAB, the code for this project jumbles secret image pixels according to the Rubik’s cube principle, hides them under a cover image, and sends them to the destination.

Skills

Certifications