INITIALIZING CYBER DEFENSE...
Open to Opportunities

SURENDRA Cyber Security

// Ethical Hacker & Security Analyst

Fresher passionate about cyber defense, vulnerability analysis, penetration testing, and security automation. Trained in AI-powered cybersecurity through the FLM curriculum. Ready to protect digital assets and build resilient security infrastructure.

10+
Projects
15+
Tools
FLM
Certified
Terminal // surendra@kali
ACTIVE
root@kali:~$ whoami
Surendra - Cyber Security Analyst
root@kali:~$ cat /etc/skills.conf
Ethical Hacking | Penetration Testing
Network Security | SIEM & SOC
Vulnerability Assessment | Python
AI-Powered Security Tools
root@kali:~$ nmap -sV -sC 192.168.1.0/24
Scanning 256 hosts... 47 open ports found
Vulnerabilities detected: 12 critical
root@kali:~$ python3 auto_scan.py --target network
[+] Automated assessment complete
[+] Report saved: /reports/scan_2026.pdf
root@kali:~$

Who Am I?

A dedicated fresher building a career in cybersecurity through hands-on training and relentless curiosity.

Cyber Security Analyst

I'm Surendra, a fresher deeply passionate about cyber defense and security operations. Through the comprehensive FLM AI-powered cybersecurity curriculum, I've built a strong foundation in ethical hacking, penetration testing, vulnerability assessment, and security automation.

My expertise spans across Kali Linux, network security analysis, SIEM tools, SOC operations, and leveraging AI-powered security tools for threat detection and response. I'm eager to contribute to organizations looking for dedicated security professionals.

Cyber Defense Vulnerability Analysis Penetration Testing Security Automation Network Security AI Security Tools

My Skills

Tools and technologies I use to secure digital environments and neutralize threats.

Kali Linux

Expert in Kali Linux for penetration testing, security assessments, and ethical hacking operations.

90%
Networking

TCP/IP, OSI model, network protocols, routing, switching, and network security architecture.

85%
Ethical Hacking

Penetration testing, vulnerability assessment, exploit development, and security auditing.

88%
Burp Suite

Web application security testing, intercepting proxy, vulnerability scanning, and manual testing.

82%
Wireshark

Network protocol analysis, packet capturing, traffic analysis, and network forensics.

85%
Nmap

Network discovery, port scanning, service detection, OS fingerprinting, and vulnerability scanning.

92%
Python

Security automation, scripting, exploit development, and building custom security tools.

80%
SIEM & SOC

Security Information & Event Management, SOC operations, log analysis, and incident response.

78%
AI Security Tools

AI-powered threat detection, automated vulnerability scanning, ML-based anomaly detection.

75%

Threat Dashboard

0
Vulnerabilities Assessed
0
Penetration Tests
0
Networks Scanned
0
Security Reports

My Projects

Hands-on projects built during the FLM Cyber Security syllabus training.

PRJ-001 Completed

Network Vulnerability Scanner

Built a comprehensive network vulnerability scanner using Python and Nmap to identify open ports, services, and potential security weaknesses in target systems.

Python Nmap Network Security Automation
PRJ-002 Completed

Web App Penetration Testing

Conducted thorough penetration testing on web applications using Burp Suite, identifying OWASP Top 10 vulnerabilities including SQL injection, XSS, and CSRF.

Burp Suite OWASP SQLi XSS
PRJ-003 Completed

Network Traffic Analysis

Performed deep packet inspection and network forensics using Wireshark to detect suspicious traffic patterns, malware communications, and data exfiltration attempts.

Wireshark Packet Analysis Forensics TCP/IP
PRJ-004 Completed

SIEM Log Analysis & IR

Configured and monitored SIEM dashboards for real-time threat detection, created custom alert rules, and developed incident response playbooks for SOC operations.

SIEM SOC Log Analysis IR Playbook
PRJ-005 In Progress

AI Threat Detection System

Developing an AI/ML-based threat detection system that analyzes network patterns, identifies anomalies, and automatically generates security alerts using Python and TensorFlow.

AI/ML Python TensorFlow Threat Detection
PRJ-006 Completed

Password Security Assessment

Performed authorized password security testing using Hashcat and John the Ripper to evaluate password strength, implement brute-force detection, and recommend security policies.

Hashcat John the Ripper Kali Linux Policy

Certifications & Training

Professional credentials and completed training programs.

// 2026

FLM Cyber Security Certification

FLM Program

Comprehensive AI-powered cybersecurity curriculum covering ethical hacking, penetration testing, network security, SIEM/SOC operations, and security automation.

// 2026

Ethical Hacking Essentials

FLM Curriculum

Mastered penetration testing methodologies, vulnerability assessment, exploit development, and post-exploitation techniques using industry-standard tools.

// 2026

Network Security Analysis

FLM Curriculum

Advanced network security training including traffic analysis, firewall configuration, IDS/IPS deployment, and network defense strategies.

// 2026

AI Security & Automation

FLM Curriculum

Specialized training in AI-powered security tools, automated vulnerability scanning, machine learning for threat detection, and security orchestration.

My Journey

Following the FLM AI-powered cybersecurity curriculum path.

Phase 01

Foundation & Networking

Built strong fundamentals in computer networking, TCP/IP protocols, OSI model, IP addressing, subnetting, and network architecture essentials.

TCP/IP OSI Model DNS Routing
Phase 02

Linux & Kali Mastery

Mastered Kali Linux environment, command-line operations, system administration, and security tool installation and configuration.

Kali Linux Bash System Admin
Phase 03

Ethical Hacking & Recon

Learned ethical hacking methodologies, information gathering, footprinting, reconnaissance, and scanning techniques using Nmap and other tools.

Nmap Recon OSINT Footprinting
Phase 04

Web & Network Pentesting

Performed hands-on penetration testing on web applications and networks, exploiting vulnerabilities like SQLi, XSS, CSRF, and buffer overflows.

Burp Suite Metasploit SQLi XSS
Phase 05

SIEM, SOC & Incident Response

Configured SIEM tools, monitored security events, performed log analysis, and developed incident response procedures for SOC environments.

SIEM SOC Log Analysis IR
Phase 06

AI Security & Automation

Integrated AI-powered security tools, automated vulnerability assessments, built custom Python scripts for security tasks, and explored ML-based threat detection.

Python AI Tools Automation ML

Let's Connect

Open to full-time roles, internships, and freelance security projects.

Ready to Secure Your Digital Assets?

I'm actively seeking opportunities in cyber security roles including SOC Analyst, Penetration Tester, Security Analyst, and freelance security consulting. Let's discuss how I can contribute to your team.