Close

Sri Sowmya Nemani

Cybersecurity Professional

About Me

A technically minded and talented individual with strong knowledge and the ability to provide technical direction in systems development, integration, and testing. I am willing to take ownership of issues until they are fully resolved and am committed to my own continuous education, certification, and self-improvement. I am a fully qualified professional with extensive hands-on knowledge of Penetration Testing, Risk Management, Cloud Services, Embedded Systems, IoT, and Cybersecurity. I am an expert at managing a system's stability, operation, security, and scalability. In the past, I have worked in large, complex computing environments where I led and motivated a team of engineers and technicians. I have been certified as an AWS Solution Architect SAC003 and a Member of ISC2. I am also Certified eJPT (Elearning Penetration Testing) and CompTIA Security+ and preparing for OSCP (Offensive Security Certified Professional Certification). View my Blog on Medium: https://medium.com/@srisowmya.nemani

UNLV Information Technology

Jr. Security Analyst

Developed comprehensive dashboards, alerts, and reports in SIEM for enhanced security monitoring and analysis. Assisted in analyzing and responding to alerts generated by EDR tools such as Sophos and vulnerability scanners like Tenable. Supported the security team in maintaining up-to-date security dashboards and reports. Collaborated with senior analysts to investigate and respond to security incidents.

UNLV Information Technology

Information Security Analyst Intern

Proficient in utilizing SIEM to develop comprehensive dashboards, alerts, and reports for enhanced security monitoring. Skilled in writing automated Python scripts for extracting data and uploading it to Splunk. Skillfully escalate complex security issues to SOC Analyst Tier 2 for further investigation, leveraging expertise in EDR Sophos and vulnerability scanner Tenable.

City of Las Vegas

IT Security Analyst Intern

Identified, mitigated, tested, remediated and documented top 10 vulnerabilities using Qualys, ensuring system security. Enhanced application security with CyberArk EPM by implementing whitelist and blocklist policies. Automated it with REST API calls to ensure policy compliance and functionality. Worked with a cross-functional team to detect and mitigate over 20 malicious alerts using Darktrace SIEM, ensuring swift incident response and threat neutralization. Improved security scores by 4% through third-party vulnerability management using Security Scorecard and Bitsight.

University of Nevada Las Vegas

Graduate Research Assistant

Spearheaded over 50 STEM projects employing Finch and Hummingbird bit technologies, resulting in the creation of groundbreaking healthcare and disability models. Led precise data collection, analysis, and interpretation, ensuring project success. Evaluated GenAI's influence on B2B and B2C marketing tactics for Fortune 100 companies. Analyzed ESG practices in Fortune 500 companies, boosting research depth and accuracy.

Zoom Cybersense

Digital Forensics Associate

Served the Government of Telangana – Telangana State Police to assist them in extracting data from seized digital devices. Tested and documented different types of tools related to Mobile Forensics, Network Forensics, OSINT, Disk Forensics, and more.

Education

University of Nevada Las Vegas

January 2023 - August 2024

Masters of Science in Cybersecurity

Projects

ThreatSim – Multi-Agent Threat Actor Simulation

ThreatSim – Multi-Agent Threat Actor Simulation

ThreatSim is an AI-powered, multi-agent threat actor simulation framework built with CrewAI, Neo4j, and FastAPI. It models adversarial behavior across the MITRE ATT&CK kill chain, enabling red-team simulation, threat intelligence enrichment, and proactive detection engineering. Each agent autonomously performs reconnaissance, lateral movement planning, and post-exploitation reasoning — producing structured attack narratives and graph-based threat paths stored in Neo4j.

View on GitHub
Network Monitoring system using Snort

Network Monitoring System Using Raspberry Pi and Snort

Snort monitors network traffic for suspicious activity and generates alerts when potential security threats are detected. Snort is open-source, highly customizable, and widely used in both small and large-scale network environments for enhancing network security.

Hand Gesture Home Automation For Visually Challenged

Hand Gesture Home Automation for the Visually Challenged

The hand gesture home automation for the visually challenged is an embedded design project in three steps. The first module uses a sensor to capture the motion of the visually challenged, and the controller (Arduino) takes input and controls the output to the motor attached to home appliances like fans, drapes, air conditioners, etc.

Digital Image Steganography with Encryption

Digital Image Steganography with Encryption Based on Rubik's Cube Principle

This project is designed to secure information by data hiding during exchange over the internet. The encryption method used is based on the Rubik's cube principle. Using MATLAB, the code for this project jumbles secret image pixels according to the Rubik's cube principle, hides them under a cover image, and sends them to the destination.

Skills

Certifications

CVE & Vulnerability Research

CVE-2026-39889

Unauthenticated SSE Event Stream Exposes All Agent Activity in PraisonAI A2U Server
CVE High Severity April 2026  |  Reported by: Sri Sowmya Nemani
Affected Product: PraisonAI (AI Agent Framework)
Vulnerability Type: Missing Authentication (CWE-306)
Component: A2U Server — a2u_server.py

Discovered and responsibly disclosed a missing authentication vulnerability in PraisonAI's Agent-to-User (A2U) event stream server. The create_a2u_routes() function registers all /a2u/* SSE endpoints with zero authentication checks, allowing any unauthenticated attacker to subscribe to live agent event streams and monitor all AI agent activity in real time — including agent responses, tool calls, and internal reasoning — without any credentials.

This vulnerability is distinct from the previously patched CVE-2026-34952, which fixed the gateway server but left the A2U server completely unprotected. The issue affects all versions of PraisonAI including the latest release.

View on CVE.org → GitHub Advisory →

Publications & Research

Adaptive Risk-Based Enforcement Using SBOM Automation for Secure Software Supply Chains

Peer Reviewed ResearchGate, 2025

Presents an adaptive risk-based enforcement framework that leverages automated SBOM generation to dynamically assess and enforce security policies across software supply chains, mapping component-level risk scores to enforcement actions within CI/CD pipelines.

Read on ResearchGate → Google Scholar →

Automating Software Supply Chain Security: SBOM Integration in CI/CD Pipelines

Peer Reviewed International Journal of Computer Applications (IJCA), Vol. 187 No. 56, 2025

Proposes a model for automatically generating Software Bills of Materials (SBOMs) in SPDX and CycloneDX formats and integrating them into CI/CD pipelines for continuous risk assessment, ensuring every build produces an auditable SBOM.

Read Paper →

A STRIDE-Based Threat Modeling Framework for Small Clinics and AI-Enabled Healthcare Services

Peer Reviewed International Journal of Computer Applications (IJCA), Vol. 187 No. 65, 2025

Proposes a lightweight STRIDE threat modeling framework tailored to small clinics and AI-augmented healthcare services, covering EHR systems, NLP-based clinical summarization, IoT sensors, and third-party SaaS APIs.

Read on ResearchGate → Read Paper (IJCA) →

I Built an AI That Simulates Real Cyberattacks — Meet ThreatGraph

Medium Security Research, March 2026

Autonomous Red and Blue Team agents, GraphRAG-powered network topology extraction, and breach probability forecasting — all running locally.

Read on Medium →

Automating FedRAMP Compliance Using Compliance-as-Code on AWS

Medium Cloud Security Research, January 2026

Demonstrates how FedRAMP compliance can be automated using real AWS cloud data rather than manual checklists, applying Compliance-as-Code principles to enforce continuous regulatory posture.

Read on Medium →

How I Identified a Reflected XSS in Citrix NetScaler Logout Flow (CVE-2025-12101)

Medium Vulnerability Research, December 2025

Original CVE research: reflected XSS in Citrix NetScaler ADC/Gateway's logout flow via the RelayState parameter reflected unsanitized in an HTML response.

Read on Medium →

Unauthenticated User Enumeration via Drupal JSON:API

Medium Bug Bounty Research, December 2025

Identified unauthenticated user enumeration in a large enterprise environment via Drupal's JSON:API endpoint, exposing internal usernames and account metadata without authentication.

Read on Medium →

How I Found a P1 Bug — Exposed Segment Analytics Key in a Banking App

Medium Bug Bounty Research, September 2025

Discovery of a critical exposed Segment analytics API key in a banking application enabling unauthorized access to customer event data — triaged as P1 severity.

Read on Medium →

How I Found a Reflected XSS in a VPN Portal Using Passive Recon and Nuclei (CVE-2025-0133)

Medium Vulnerability Research, August 2025

End-to-end walkthrough of discovering a reflected XSS in a Palo Alto GlobalProtect VPN portal using subdomain enumeration, live host detection, and automated Nuclei scanning.

Read on Medium →

Detecting CVE-2025-53770: SharePoint ViewState Deserialization Vulnerability

Medium Security Research, July 2025

Detection guide for CVE-2025-53770, a critical actively-exploited RCE in on-prem Microsoft SharePoint via deserialization of untrusted __VIEWSTATE data. Includes a custom Nuclei template.

Read on Medium →

More Research & Writeups

Full list of publications and bug bounty writeups on Google Scholar and Medium.

All Medium Articles → Google Scholar →