texture
scroll down arrow

Hi! I’m Rohith

Graduate Student In Cyber Security

Hire Me arrow
shape
pattern img

Graduate student in cybersecurity with expertise in digital forensics, reverse engineering, threat analysis and cyber defense. Proven project experience in these areas. Eager to leverage skills to enhance your company’s cybersecurity initiatives. Committed to contributing effectively and growing within the field.

• With a proven track record in threat analysis, I bring a strategic approach to identifying and preemptively addressing cyber threats. This proactive stance ensures that the company stays ahead of potential security risks, minimizing the impact of potential breaches and safeguarding sensitive information.

porojects

shape
Technology

Temporary Disposable Server

Disposable email service is an online service where you can get a temporary email address or an anonymous email account for signing up on cer- thin websites

View Live arrow
Cybersecuirty

Intrusion Detection Using Deep Learning

My major undergraduate project involves developing an Intrusion Detection System (IDS) utilizing deep learning techniques to enhance the security of a system by effectively identifying and alerting against unauthorized access and potential threats

View Live arrow
Technology

Project Management Dashboard

This comprehensive dashboard integrates key project elements, facilitating real-time decision-making and enhancing communication among team members and stakeholders.

View Live arrow
portfolio img
portfolio img
portfolio img

My Skills

SIEM & Splunk Analytics

Expert in deploying and managing SIEM solutions like Splunk for real-time threat detection, log analysis, and incident correlation to strengthen security operations.

Incident Response & Digital Forensics

Skilled in coordinating incident response efforts and conducting digital forensic investigations to rapidly identify, contain, and remediate security breaches.

Threat Intelligence & Hunting

Adept at gathering and analyzing threat intelligence to proactively hunt for adversarial activities, ensuring a fortified security posture.

Penetration Testing & Vulnerability Management

Experienced in performing penetration tests and vulnerability assessments to identify weaknesses and implement effective remediation strategies.

Network Security Monitoring & IDS/IPS

Proficient in configuring and managing network monitoring tools alongside intrusion detection/prevention systems to continuously secure network traffic.

Cloud Security Engineering

Demonstrated expertise in securing cloud environments by implementing robust access controls, encryption, and compliance measures in multi-cloud architectures.

Endpoint Detection & Response (EDR)

Skilled in deploying and managing advanced endpoint security solutions to detect, analyze, and respond to threats across diverse endpoints.

Compliance, Risk & Governance

Experienced in developing and enforcing policies, performing risk assessments, and ensuring regulatory compliance to maintain a secure operational framework.

Security Architecture & Engineering

Proficient in designing secure infrastructures and implementing layered security controls to build resilient systems against evolving cyber threats.

Security Automation & Orchestration

Adept at leveraging automation tools and scripting (e.g., Python) to streamline security processes, enhance incident response, and reduce manual workload.

Certifications

icon

Security+ CompTIA Certification

Earned the Security+ certification from CompTIA, demonstrating proficiency in security fundamentals, network threat mitigation, and risk management.

watermark
icon

Microsoft SC-200 Certification

Achieved Microsoft SC-200 certification, showcasing expertise in modern security operations, threat detection, and incident response strategies.

watermark
icon

Splunk Core Certified

Obtained Splunk Core Certified credential, validating skills in searching, monitoring, and analyzing machine data to enhance security intelligence.

watermark
icon

Aviatrix Certified Engineer

The Aviatrix Certified Engineer (ACE) program is a multi-cioud networking and security certification .

watermark
icon

Cyber Security Specialisation , University of Maryland

Gained expertise in threat detection, vulnerability assessment, and risk management

watermark
icon

Cisco ISTE National CODATHON-2020

The Cisco ISTE National CODATHON-2020 was a coding competition organized by Cisco and the International Society for Technology in Education (ISTE) in 2020.

watermark
quote

The only secure computer is one that's unplugged, locked in a safe, and buried 20 feet under the ground in a secret location... and I'm not even too sure about that one

Dennis Huges Former FBI agent and computer crime expert
quote

Security is not having things, it's handling things

Richard Stallman known by his initials "RMS
quote

Saying, 'I don't care about privacy because I have nothing to hide,' is like saying, 'I don't care about freedom of speech because I have nothing to say

Edward Snowden Former intelligence contractor (NSA)
author img
author img
author img