About


Passionate about cybersecurity, I specialize in penetration testing, vulnerability assessments, and risk mitigation. With hands-on experience as a Security Analyst and a CEH v12 certification, I excel in securing networks and applications. I hold a Bachelor's in Computer Applications from VIT and i completed a Master’s in Cybersecurity at Dublin Business School with First Class Honours. Skilled in tools like Nmap, Metasploit, and languages including Python, C, C++, and C#, I actively engage in CTFs to stay ahead. With interests in web development and cloud computing, I strive to integrate them with cybersecurity for innovative solutions. Let’s connect!

  • City: Dublin, Ireland

Interests

Security Analyst

Penetration Testing

Cloud Security

Digital Forensics

Security Consultant

Information Security

Web Development

Software Development

Education

MSc in Cybersecurity

September 2024 - September 2025
Relevant Coursework
  • Penetration Testing
  • Cloud Computing
  • Digital Forensics
  • Information Security
  • Threat Intelligence
  • Web Application Security
  • Network Security
  • Cloud Security

BCA - Bachelor’s of Computer Applications

July 2020 - July 2023
Relevant Coursework
  • Database Management Systems
  • Operating Systems
  • Computer Networks
  • Computer Architecture
  • Computer Organization
  • Computer Security
  • Software Engineering
  • Web Development

Certifications

CEH - Certified Ethical Hacker

Experience

Hackup Technology

July 2022 - July 2024

Security Analyst

  • Monitor and analyse security alerts across Splunk SIEM, IBM QRadar, and CrowdStrike EDR platforms to identify potential threats and security incidents.
  • Perform initial triage of security events, investigate alerts, and escalate high-priority incidents to L2/L3 teams following established SOPs.
  • Document all security incidents in ticketing systems with detailed investigation notes and remediation actions.
  • Conduct vulnerability assessments using Nessus and collaborate with IT teams for remediation.
  • Monitor endpoint security via CrowdStrike Falcon, investigating suspicious activities and behavioural detections.
  • Analyse logs, network traffic, and system events to identify IOCs and attack patterns.
  • Collaborate with cross-functional teams including IT, Network, and Management to implement security controls and communicate threat intelligence.
  • Generate regular security reports on incident metrics, threat trends, and overall security posture for stakeholder review.

Projects

  • All
  • Web-App
  • Project

Vulnerability
Scanner

Automated Container Deployment

Resume Section Classifier

Skills

Languages and Databases

vectorlogo.zone vectorlogo.zone vectorlogo.zone upload.wikimedia.org vectorlogo.zone vectorlogo.zone

Some Cybersecurity Related Stuffs

vectorlogo.zone vectorlogo.zone vectorlogo.zone vectorlogo.zone vectorlogo.zone vectorlogo.zone vectorlogo.zone

Tools

vectorlogo.zone vectorlogo.zone vectorlogo.zone vectorlogo.zone

Contact

Social Profiles

Contact

+353 894720296