Fresher passionate about cyber defense, vulnerability analysis, penetration testing, and security automation. Trained in AI-powered cybersecurity through the FLM curriculum. Ready to protect digital assets and build resilient security infrastructure.
A dedicated fresher building a career in cybersecurity through hands-on training and relentless curiosity.
I'm Surendra, a fresher deeply passionate about cyber defense and security operations. Through the comprehensive FLM AI-powered cybersecurity curriculum, I've built a strong foundation in ethical hacking, penetration testing, vulnerability assessment, and security automation.
My expertise spans across Kali Linux, network security analysis, SIEM tools, SOC operations, and leveraging AI-powered security tools for threat detection and response. I'm eager to contribute to organizations looking for dedicated security professionals.
Tools and technologies I use to secure digital environments and neutralize threats.
Expert in Kali Linux for penetration testing, security assessments, and ethical hacking operations.
TCP/IP, OSI model, network protocols, routing, switching, and network security architecture.
Penetration testing, vulnerability assessment, exploit development, and security auditing.
Web application security testing, intercepting proxy, vulnerability scanning, and manual testing.
Network protocol analysis, packet capturing, traffic analysis, and network forensics.
Network discovery, port scanning, service detection, OS fingerprinting, and vulnerability scanning.
Security automation, scripting, exploit development, and building custom security tools.
Security Information & Event Management, SOC operations, log analysis, and incident response.
AI-powered threat detection, automated vulnerability scanning, ML-based anomaly detection.
Hands-on projects built during the FLM Cyber Security syllabus training.
Built a comprehensive network vulnerability scanner using Python and Nmap to identify open ports, services, and potential security weaknesses in target systems.
Conducted thorough penetration testing on web applications using Burp Suite, identifying OWASP Top 10 vulnerabilities including SQL injection, XSS, and CSRF.
Performed deep packet inspection and network forensics using Wireshark to detect suspicious traffic patterns, malware communications, and data exfiltration attempts.
Configured and monitored SIEM dashboards for real-time threat detection, created custom alert rules, and developed incident response playbooks for SOC operations.
Developing an AI/ML-based threat detection system that analyzes network patterns, identifies anomalies, and automatically generates security alerts using Python and TensorFlow.
Performed authorized password security testing using Hashcat and John the Ripper to evaluate password strength, implement brute-force detection, and recommend security policies.
Professional credentials and completed training programs.
Comprehensive AI-powered cybersecurity curriculum covering ethical hacking, penetration testing, network security, SIEM/SOC operations, and security automation.
Mastered penetration testing methodologies, vulnerability assessment, exploit development, and post-exploitation techniques using industry-standard tools.
Advanced network security training including traffic analysis, firewall configuration, IDS/IPS deployment, and network defense strategies.
Specialized training in AI-powered security tools, automated vulnerability scanning, machine learning for threat detection, and security orchestration.
Following the FLM AI-powered cybersecurity curriculum path.
Built strong fundamentals in computer networking, TCP/IP protocols, OSI model, IP addressing, subnetting, and network architecture essentials.
Mastered Kali Linux environment, command-line operations, system administration, and security tool installation and configuration.
Learned ethical hacking methodologies, information gathering, footprinting, reconnaissance, and scanning techniques using Nmap and other tools.
Performed hands-on penetration testing on web applications and networks, exploiting vulnerabilities like SQLi, XSS, CSRF, and buffer overflows.
Configured SIEM tools, monitored security events, performed log analysis, and developed incident response procedures for SOC environments.
Integrated AI-powered security tools, automated vulnerability assessments, built custom Python scripts for security tasks, and explored ML-based threat detection.
Open to full-time roles, internships, and freelance security projects.
I'm actively seeking opportunities in cyber security roles including SOC Analyst, Penetration Tester, Security Analyst, and freelance security consulting. Let's discuss how I can contribute to your team.