Amirthaganesh S

Computer Science & Cybersecurity Engineer

To defend a system, you must first understand the art of its destruction. I leverage an adversarial mindset to build a defensive reality.

▼ Scroll to explore

I'm a dedicated Cybersecurity student and enthusiast specializing in Defensive Operations and Infrastructure Hardening. I bridge the gap between core IT administration and proactive threat mitigation. My methodology focuses on Cybersecurity Frameworks, leveraging automation and deep-packet analysis to secure organizational assets.

Career Objective

Currently seeking an entry-level SOC Analyst or Cybersecurity role where I can apply my technical agility and analytical mindset to protect critical data and respond to emerging threats in real-time.

B.E. — Computer Science & Cybersecurity Engineering

Focused on architecting Secure-by-Design systems and defending digital infrastructure. Expert in bridging core software engineering with proactive threat mitigation, vulnerability assessment, and robust network defense.

Strategically fortifying hybrid environments by merging core engineering with global security frameworks. Deploying advanced toolsets for vulnerability management, network orchestration, and proactive threat detection.

Core Skills

  • NetworkingTCP/IP, OSI, IP Addressing, Subnetting, Firewall, VPN
  • Scripting LanguagePython, Bash, PowerShell
  • Network Security MonitoringWireshark, Zeek, Suricata / Snort, Security Onion
  • Threat DetectionLog Monitoring & Triage, SIEM (Splunk, ELK, Microsoft Sentinel), XDR (Wazuh)
  • Incident ResponseIRP, Forensics, Playbooks, Tabletop Exercises
  • Identity ManagementActive Directory, GPO, MFA, SSO
  • Vulnerability ManagementNessus, Burp Suite, Nmap, Hardening
  • FrameworksNIST (CSF), ISO 27001, MITRE ATT&CK®, OWASP Top 10

Foundational Skills

  • Programming LanguagePython, C (Basics)
  • Systems & InfrastructureLinux (Ubuntu, Kali), Windows & Linux Server
  • Cloud & VirtualizationAWS, Azure, VMware
  • Deployment Tools & VCSGit, GitHub, Docker
  • Database ManagementMySQL, PostgreSQL
  • IT SupportHardware Maintenance, Remote Desktop (RDP), Troubleshooting
  • Web DevelopmentHTML, CSS (Basics), JavaScript (Basics)

Soft Skills

  • CommunicationRelaying risk to stakeholders and collaborating with cross-functional teams.
  • TeamworkCollaborating across departments to implement security measures.
  • Problem SolvingAnalyzing complex issues and developing effective solutions.
  • AdaptabilityRapid learning of zero-day exploits and emerging attack vectors.
  • Time ManagementPrioritizing tasks during high-pressure incidents and managing multiple projects.

A collection of controlled environments and security implementations designed to stress-test defensive architectures and validate mitigation strategies.

CyberSecurity_Lab_Setup

A comprehensive home lab environment simulating real-world attack scenarios. Integrated tools for network monitoring, vulnerability assessment, and incident response to validate defensive strategies and enhance practical skills.


Meiyan — Threat Intelligence & Malware Analysis CLI

A parallelized engine that synthesizes global security APIs into a singular, actionable verdict. Utilizes custom-weighted algorithms to automate indicator scoring and accelerate the investigative lifecycle.

Mithran — Voice AI Agent

A real-world, production-grade voice AI agent built with LiveKit Agents and OpenAI Realtime API. It listens, understands, and speaks in real time, with near-human latency.



In the rapidly evolving landscape of cybersecurity, staying current is a requirement. I actively pursue rigorous certifications to sharpen my defensive skills and stay ahead of emerging threat vectors.

Google Cybersecurity Professional Certificate

Comprehensive professional certification covering foundational cybersecurity skills including risk management, threat analysis, network security, incident response, and security automation with Python.

Verify Certificate

Foundations of Cybersecurity
Core principles of cybersecurity, threat landscape analysis, and security frameworks including CIA triad and security controls.
Verify Certificate
Play It Safe: Manage Security Risks
Risk management strategies, security audits, incident escalation procedures, and implementing effective security controls.
Verify Certificate
Connect and Protect: Networks and Network Security
Network architecture, protocols (TCP/IP), network hardening techniques, and securing cloud-based infrastructure.
Verify Certificate
Tools of the Trade: Linux and SQL
Linux command-line operations, file permissions, SQL queries for security investigations, and database management essentials.
Verify Certificate
Assets, Threats, and Vulnerabilities
Asset classification, vulnerability management, threat modeling, and implementing defense-in-depth strategies.
Verify Certificate
Sound the Alarm: Detection and Response
Incident detection, SIEM tools, log analysis, incident response lifecycle, and security monitoring best practices.
Verify Certificate
Automate Cybersecurity Tasks with Python
Python programming for security automation, parsing logs, file operations, and building security scripts for efficiency.
Verify Certificate
Put It to Work: Prepare for Cybersecurity Jobs
Career preparation, portfolio building, interview techniques, and professional development in cybersecurity roles.
Verify Certificate
Accelerate Your Job Search with AI
Leveraging AI tools for resume optimization, job search strategies, and networking in the cybersecurity industry.
Verify Certificate

Cisco – Junior Cybersecurity Analyst Career Path

Recognized mastery of cybersecurity principles including threat intelligence, risk management, asset security, network security, and security operations.

Verify Certificate

Introduction to Cybersecurity

Developed a security-first mindset centered on protecting digital privacy and organizational data.


Verify Certificate
Networking Basics

Established a foundational understanding of network architecture, protocols, and the OSI, TCP/IP model.


Verify Certificate
Networking Devices and Initial Configuration

Gained experience in the basic setup, Troubleshooting and secure configuration of Cisco routers and switches.


Verify Certificate
Endpoint Security

Focused on mitigate risks at the user level to prevent lateral movement within a network.


Verify Certificate
Network Defense

Focused on implementing strategies for monitoring, detecting, and responding to unauthorized network intrusions.


Verify Certificate
Cyber Threat Management

Learned to identifying, analyzing, and mitigating sophisticated cyber threats and vulnerabilities.


Verify Certificate

Udemy - Learn Ethical Hacking From Scratch
(by Z Security)

Recognized expertise in identifying vulnerabilities, penetration testing, and implementing robust security measures.


APISEC - API Security Fundamentals 2025

Provides a comprehensive introduction to API security, covering why APIs are under attack, real-world breach examples, and the OWASP API Security Top 10.

Real-world security engagement — applying offensive and defensive techniques in a structured, production-adjacent environment.

Elevate Labs
Cyber Security Intern
20 OCT 2025  →  04 DEC 2025  //  6 WEEKS
  • Executed real-world cybersecurity tasks across offensive and defensive domains, contributing to live security projects throughout the internship period.
  • Demonstrated exceptional analytical thinking and professionalism — recognized as Best Performer out of the intern cohort by Elevate Labs leadership.
  • Applied hands-on skills in threat analysis, vulnerability identification, and security tooling within a structured, production-adjacent environment.
  • Operated under the Skill India / MSME Ministry of India framework — internship recognized at a national programme level.

CONTACT

Feel free to reach out for collaborations or inquiries.

amirthaganesh7521@gmail.com