Summary
Overview
Work History
Education
Skills
Certification
Additional Information
Software
Timeline
Work Availability
Quote
project
Languages
photography
SeniorSoftwareEngineer
SHARATH M

SHARATH M

Cybersecurity Analyst
Bengaluru,KA

Summary

Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.

Overview

1
1
year of professional experience
4
4

Years of post-secondary degree

5
5
Certificates
1
1

Certified ethical hacker

Work History

Security Analyst Trainee

Tracelay
12.2024 - Current
  • Company Overview: Bootcamp
  • Developed and implemented next-gen SOC defense strategies, leading the introduction of Managed Detection and Response (MDR) services that improved threat detection time by reducing average response duration from 12 hours to 4 hours
  • Worked with Extrahop NDR for network traffic analysis and threat detection
  • Identified and reported five high-risk security threats through real-time detection analysis
  • Participated in blue team exercises to enhance threat detection capabilities
  • Bootcamp

Cybersecurity Engineer Intern

Network Kings
05.2024 - 10.2024
  • Reduced information security risks by 90% through vulnerability assessments and mitigation strategies
  • Conducted penetration testing using tools like Nmap, Metasploit, and theHarvester to identify security gaps
  • Implemented SOC automation in a home lab to enhance security monitoring
  • Developed phishing awareness campaigns using tools like Gophish and Zphisher
  • Assisted in incident response, performing root cause analysis and recommending security improvements
  • Created security reports & dashboards to monitor threat trends and security incidents

Education

Bachelor of Engineering - Computer Science

Canara Engineering College
Mangalore
04.2021 - 06.2024

Skills

Ethical hacking

Certification

CEHv13- Certified Ethical Hacking, EC-Council

Additional Information

Active participant in cybersecurity forums like Hack the Box, TryHackMe , CyberDefenders , LetsDefend .

Software

Nessus

OpenVAS

Extrahop

Trend Micro XDR

Splunk

Burp Suite

Nmap

Wireshark

Metasploit

Timeline

Security Analyst Trainee

Tracelay
12.2024 - Current

Cybersecurity Engineer Intern

Network Kings
05.2024 - 10.2024

Bachelor of Engineering - Computer Science

Canara Engineering College
04.2021 - 06.2024

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Quote

Life is something that happens to you while you’re making other plans.
Margaret Milar

project

Continuous Facial Authentication Using Fuzzy System

• The emergence of continuous facial authentication using fuzzy logic points to success in protecting user data in the driver environment.

• This new approach transforms user authentication by integrating  facial recognition into log-in, log-in and log-out processes.

• When users create an account, their facial profile is carefully recorded and associated with DriveSpace, providing ongoing verification throughout

• The system not only identifies the user, but is also vigilant, immediately cutting  off the connection when it detects illegal or inappropriate behavior

Languages

English
Advanced (C1)
kannada
Bilingual or Proficient (C2)
Hindi
Advanced (C1)
Malayalam
Advanced (C1)

photography

passionate photographer and editor 

SHARATH MCybersecurity Analyst