forked from RyanFitzgerald/devportfolio
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
267 lines (250 loc) · 13.1 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
<!DOCTYPE html>
<html class="no-js" lang="en">
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>My Portfolio</title>
<link rel="shortcut icon" href="favicon.ico" type="image/x-icon">
<link rel="icon" href="favicon.ico" type="image/x-icon">
<link href="https://fonts.googleapis.com/css?family=Lato:300,400,700,900" rel="stylesheet">
<link rel="stylesheet" href="libs/font-awesome/css/font-awesome.min.css">
<link href="css/bootstrap.min.css" rel="stylesheet">
<link href="css/styles.css" rel="stylesheet">
</head>
<body>
<div id="mobile-menu-open" class="shadow-large">
<i class="fa fa-bars" aria-hidden="true"></i>
</div>
<!-- End #mobile-menu-open -->
<header>
<div id="mobile-menu-close">
<span>Close</span> <i class="fa fa-times" aria-hidden="true"></i>
</div>
<ul id="menu" class="shadow">
<li><a href="#about">About</a></li>
<li><a href="#experience">Experience</a></li>
<li><a href="#education">Education</a></li>
<li><a href="#projects">Projects</a></li>
<li><a href="#skills">Skills</a></li>
<li><a href="#certifications">Certifications</a></li>
</ul>
</header>
<!-- End header -->
<div id="lead">
<div id="lead-content">
<h1>Sri Sowmya Nemani</h1>
<h2>Cybersecurity Professional</h2>
</div>
<!-- End #lead-content -->
<div id="lead-overlay"></div>
<div id="lead-down">
<span>
<i class="fa fa-chevron-down" aria-hidden="true"></i>
</span>
</div>
<!-- End #lead-down -->
</div>
<!-- End #lead -->
<div id="about">
<div class="container">
<div class="row">
<div class="col-md-4">
<h2 class="heading">About Me</h2>
</div>
<div class="col-md-8">
<p>
A technically minded and talented individual with strong knowledge and the ability to provide technical direction in systems development, integration, and testing.
I am willing to take ownership of issues until they are fully resolved and am committed to my own continuous education, certification, and self-improvement.
I am a fully qualified professional with extensive hands-on knowledge of Penetration Testing, Risk Management, Cloud Services, Embedded Systems, IoT, and Cybersecurity. I am an expert at managing a system's stability, operation, security, and scalability.
In the past, I have worked in large, complex computing environments where I led and motivated a team of engineers and technicians.
I have been certified as an AWS Solution Architect SAC003 and a Member of ISC2. I am also Certified eJPT (Elearning Penetration Testing) and preparing for OSCP (Offensive Security Certified Professional Certification).
View my Blog on Medium: <a href="https://medium.com/@srisowmya.nemani" target="_blank">https://medium.com/@srisowmya.nemani</a>
</p>
</div>
</div>
</div>
</div>
<!-- End #about -->
<div id="experience-timeline">
<div data-date="August2024">
<h3>UNLV Information Technology</h3>
<h4>Jr.Security Analyst</h4>
<p>
Developed comprehensive dashboards, alerts, and reports in SIEM for enhanced security monitoring and analysis.
Assisted in analyzing and responding to alerts generated by EDR tools such as Sophos and vulnerability scanners like Tenable.
Supported the security team in maintaining up-to-date security dashboards and reports.
Collaborated with senior analysts to investigate and respond to security incidents.
</p>
</div>
<div data-date="May 2024-August2024">
<h3>UNLV Information Technology</h3>
<h4>Information Security Analyst Intern</h4>
<p>
Proficient in utilizing SIEM to develop comprehensive dashboards, alerts, and reports for enhanced security monitoring.
Skilled in writing automated Python scripts for extracting data and uploading it to Splunk.
Skillfully escalate complex security issues to SOC Analyst Tier 2 for further investigation, leveraging expertise in EDR Sophos and vulnerability scanner Tenable.
</p>
</div>
<div data-date="March 2024-August2024">
<h3>City of Las Vegas</h3>
<h4>IT Security Analyst Intern</h4>
<p>
Identified, mitigated, tested, remediated and documented top 10 vulnerabilities using Qualys, ensuring system security.
Enhanced application security with CyberArk EPM by implementing whitelist and blocklist policies. Automated it with REST API calls to ensure policy compliance and functionality.
Worked with a cross-functional team to detect and mitigate over 20 malicious alerts using Darktrace SIEM, ensuring swift incident response and threat neutralization.
Improved security scores by 4% through third-party vulnerability management using Security Scorecard and Bitsight.
</p>
</div>
<div data-date="January 2023-May2024">
<h3>University of Nevada Las Vegas</h3>
<h4>Graduate Research Assistant</h4>
<p>
Spearheaded over 50 STEM projects employing Finch and Hummingbird bit technologies, resulting in the creation of groundbreaking healthcare and disability models.
Led precise data collection, analysis, and interpretation, ensuring project success.
Evaluated GenAI's influence on B2B and B2C marketing tactics for Fortune 100 companies.
Analyzed ESG practices in Fortune 500 companies, boosting research depth and accuracy.
</p>
</div>
<div data-date="September 2021 – September 2022">
<h3>Zoom Cybersense</h3>
<h4>Digital Forensics Associate</h4>
<p>
Served the Government of Telangana – Telangana State Police to assist them in extracting data from seized digital devices.
Tested and documented different types of tools related to Mobile Forensics, Network Forensics, OSINT, Disk Forensics, and more.
</p>
</div>
</div>
</div>
<!-- End #experience -->
<div id="education">
<h2 class="heading">Education</h2>
<div class="education-block">
<h3>University of Nevada Las Vegas</h3>
<span class="education-date">January 2023 - August 2024</span>
<h4>Masters of Science in Cybersecurity</h4>
</div>
<!-- End .education-block -->
</div>
<!-- End #education -->
<div id="projects" class="background-alt">
<h2 class="heading">Projects</h2>
<div class="container">
<div class="row">
<div class="project shadow-large">
<div class="project-image">
<img src="images/snort.jpg" alt="Network Monitoring system using Snort" width="300" height="250" />
</div>
<div class="project-info">
<h3>Network Monitoring System Using Raspberry Pi and Snort</h3>
<p>
Snort monitors network traffic for suspicious activity and generates alerts when potential security threats are detected. Snort is open-source, highly customizable, and widely used in both small and large-scale network environments for enhancing network security. By regularly monitoring network traffic and responding to alerts generated by Snort, network administrators can quickly identify and respond to potential security threats before they cause significant damage to the network.
</p>
</div>
<!-- End .project-info -->
</div>
<!-- End .project -->
<div class="project shadow-large">
<div class="project-image">
<img src="images/empower-your-iot-ecosystem-with-smart-data.jpg" alt="Hand Gesture Home Automation For Visually Challenged" width="300" height="250" />
</div>
<div class="project-info">
<h3>Hand Gesture Home Automation for the Visually Challenged</h3>
<p>
The hand gesture home automation for the visually challenged is an embedded design project in three steps. The first module uses a sensor to capture the motion of the visually challenged, and the controller (Arduino) takes input and controls the output to the motor attached to home appliances like fans, drapes, air conditioners, etc. This project focuses on enabling home electronic devices to be controlled by hand gestures.
</p>
</div>
<!-- End .project-info -->
</div>
<!-- End .project -->
<div class="project shadow-large">
<div class="project-image">
<img src="images/stegnography.jpeg" alt="Digital Image Steganography with Encryption" width="300" height="250" />
</div>
<div class="project-info">
<h3>Digital Image Steganography with Encryption Based on Rubik's Cube Principle</h3>
<p>
This project is designed to secure information by data hiding during exchange over the internet. The encryption method used is based on the Rubik’s cube principle. Using MATLAB, the code for this project jumbles secret image pixels according to the Rubik’s cube principle, hides them under a cover image, and sends them to the destination.
</p>
</div>
<!-- End .project-info -->
</div>
<!-- End .project -->
</div>
</div>
</div>
<!-- End #projects -->
<div id="skills">
<h2 class="heading">Skills</h2>
<ul>
<li>Kali Linux</li>
<li>Python</li>
<li>VAPT</li>
<li>OSINT</li>
<li>SOC</li>
<li>SIEM</li>
<li>Splunk</li>
<li>Computer Networks</li>
<li>AWS Solution Architect</li>
<li>Git</li>
<li>Docker</li>
<li>HTML</li>
<li>CSS</li>
<li>Digital Forensics</li>
<li>Risk Management</li>
<li>Embedded Systems</li>
<li>Robotics</li>
<li>IoT</li>
<li>Incident Response</li>
<li>Google Software</li>
<li>DevSecOps</li>
<li>CI/CD</li>
</ul>
</div>
<!-- End #skills -->
<div id="certifications">
<h2 class="heading">Certifications</h2>
<ul>
<li>Amazon Web Services - Solution Architect SA C003</li>
<li>Certified in Cybersecurity by USCouncil</li>
<li>Splunk Core Certified Power User SPL1002</li>
<li>eJPT Elearning Junior Penetration Testing</li>
</ul>
</div>
<footer>
<div class="container">
<div class="row">
<div class="col-sm-5 copyright">
<p>
Copyright © <span id="current-year">2024</span> Sri Sowmya Nemani
</p>
</div>
<div class="col-sm-2 top">
<span id="to-top">
<i class="fa fa-chevron-up" aria-hidden="true"></i>
</span>
</div>
<div class="col-sm-5 social">
<ul>
<li>
<a href="https://github.com/srisowmya2000" target="_blank"><i class="fa fa-github" aria-hidden="true"></i></a>
</li>
<li>
<a href="https://medium.com/@srisowmya.nemani" target="_blank"><i class="fa fa-medium" aria-hidden="true"></i></a>
</li>
<li>
<a href="https://www.linkedin.com/in/srisowmyanemani/" target="_blank"><i class="fa fa-linkedin" aria-hidden="true"></i></a>
</li>
<li>
<a href="https://twitter.com/SowmyaNemani" target="_blank"><i class="fa fa-twitter" aria-hidden="true"></i></a>
</li>
</ul>
</div>
</div>
</div>
</footer>
<!-- End footer -->
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script>
<script src="js/scripts.min.js"></script>
</body>
</html>