A technically minded and talented individual with strong knowledge and the ability to provide technical direction in systems development, integration, and testing. I am willing to take ownership of issues until they are fully resolved and am committed to my own continuous education, certification, and self-improvement. I am a fully qualified professional with extensive hands-on knowledge of Penetration Testing, Risk Management, Cloud Services, Embedded Systems, IoT, and Cybersecurity. I am an expert at managing a system's stability, operation, security, and scalability. In the past, I have worked in large, complex computing environments where I led and motivated a team of engineers and technicians. I have been certified as an AWS Solution Architect SAC003 and a Member of ISC2. I am also Certified eJPT (Elearning Penetration Testing) and CompTIA Security+ and preparing for OSCP (Offensive Security Certified Professional Certification). View my Blog on Medium: https://medium.com/@srisowmya.nemani
Developed comprehensive dashboards, alerts, and reports in SIEM for enhanced security monitoring and analysis. Assisted in analyzing and responding to alerts generated by EDR tools such as Sophos and vulnerability scanners like Tenable. Supported the security team in maintaining up-to-date security dashboards and reports. Collaborated with senior analysts to investigate and respond to security incidents.
Proficient in utilizing SIEM to develop comprehensive dashboards, alerts, and reports for enhanced security monitoring. Skilled in writing automated Python scripts for extracting data and uploading it to Splunk. Skillfully escalate complex security issues to SOC Analyst Tier 2 for further investigation, leveraging expertise in EDR Sophos and vulnerability scanner Tenable.
Identified, mitigated, tested, remediated and documented top 10 vulnerabilities using Qualys, ensuring system security. Enhanced application security with CyberArk EPM by implementing whitelist and blocklist policies. Automated it with REST API calls to ensure policy compliance and functionality. Worked with a cross-functional team to detect and mitigate over 20 malicious alerts using Darktrace SIEM, ensuring swift incident response and threat neutralization. Improved security scores by 4% through third-party vulnerability management using Security Scorecard and Bitsight.
Spearheaded over 50 STEM projects employing Finch and Hummingbird bit technologies, resulting in the creation of groundbreaking healthcare and disability models. Led precise data collection, analysis, and interpretation, ensuring project success. Evaluated GenAI's influence on B2B and B2C marketing tactics for Fortune 100 companies. Analyzed ESG practices in Fortune 500 companies, boosting research depth and accuracy.
Served the Government of Telangana – Telangana State Police to assist them in extracting data from seized digital devices. Tested and documented different types of tools related to Mobile Forensics, Network Forensics, OSINT, Disk Forensics, and more.
ThreatSim is an AI-powered, multi-agent threat actor simulation framework built with CrewAI, Neo4j, and FastAPI. It models adversarial behavior across the MITRE ATT&CK kill chain, enabling red-team simulation, threat intelligence enrichment, and proactive detection engineering. Each agent autonomously performs reconnaissance, lateral movement planning, and post-exploitation reasoning — producing structured attack narratives and graph-based threat paths stored in Neo4j.
View on GitHub
Snort monitors network traffic for suspicious activity and generates alerts when potential security threats are detected. Snort is open-source, highly customizable, and widely used in both small and large-scale network environments for enhancing network security.
The hand gesture home automation for the visually challenged is an embedded design project in three steps. The first module uses a sensor to capture the motion of the visually challenged, and the controller (Arduino) takes input and controls the output to the motor attached to home appliances like fans, drapes, air conditioners, etc.
This project is designed to secure information by data hiding during exchange over the internet. The encryption method used is based on the Rubik's cube principle. Using MATLAB, the code for this project jumbles secret image pixels according to the Rubik's cube principle, hides them under a cover image, and sends them to the destination.
a2u_server.py
Discovered and responsibly disclosed a missing authentication vulnerability in PraisonAI's Agent-to-User (A2U) event stream server.
The create_a2u_routes() function registers all /a2u/* SSE endpoints with zero authentication checks,
allowing any unauthenticated attacker to subscribe to live agent event streams and monitor all AI agent activity in real time —
including agent responses, tool calls, and internal reasoning — without any credentials.
This vulnerability is distinct from the previously patched CVE-2026-34952, which fixed the gateway server but left the A2U server completely unprotected. The issue affects all versions of PraisonAI including the latest release.
View on CVE.org → GitHub Advisory →Presents an adaptive risk-based enforcement framework that leverages automated SBOM generation to dynamically assess and enforce security policies across software supply chains, mapping component-level risk scores to enforcement actions within CI/CD pipelines.
Read on ResearchGate → Google Scholar →Proposes a model for automatically generating Software Bills of Materials (SBOMs) in SPDX and CycloneDX formats and integrating them into CI/CD pipelines for continuous risk assessment, ensuring every build produces an auditable SBOM.
Read Paper →Proposes a lightweight STRIDE threat modeling framework tailored to small clinics and AI-augmented healthcare services, covering EHR systems, NLP-based clinical summarization, IoT sensors, and third-party SaaS APIs.
Read on ResearchGate → Read Paper (IJCA) →Autonomous Red and Blue Team agents, GraphRAG-powered network topology extraction, and breach probability forecasting — all running locally.
Read on Medium →Demonstrates how FedRAMP compliance can be automated using real AWS cloud data rather than manual checklists, applying Compliance-as-Code principles to enforce continuous regulatory posture.
Read on Medium →Original CVE research: reflected XSS in Citrix NetScaler ADC/Gateway's logout flow via the RelayState parameter reflected unsanitized in an HTML response.
Identified unauthenticated user enumeration in a large enterprise environment via Drupal's JSON:API endpoint, exposing internal usernames and account metadata without authentication.
Read on Medium →Discovery of a critical exposed Segment analytics API key in a banking application enabling unauthorized access to customer event data — triaged as P1 severity.
Read on Medium →End-to-end walkthrough of discovering a reflected XSS in a Palo Alto GlobalProtect VPN portal using subdomain enumeration, live host detection, and automated Nuclei scanning.
Read on Medium →Detection guide for CVE-2025-53770, a critical actively-exploited RCE in on-prem Microsoft SharePoint via deserialization of untrusted __VIEWSTATE data. Includes a custom Nuclei template.
Full list of publications and bug bounty writeups on Google Scholar and Medium.
All Medium Articles → Google Scholar →