Cybersecurity Analyst with a strong foundation in Artificial Intelligence and Machine Learning, specializing in intelligent threat detection, automated security analysis, and next-generation defense systems. I leverage AI-driven approaches to enhance vulnerability assessment, anomaly detection, and security automationโcombining traditional cybersecurity practices with cutting-edge machine learning techniques.
My expertise spans building intelligent security solutions: from developing automated threat hunting workflows using SIEM platforms like Splunk to implementing ML-based anomaly detection for network traffic analysis. I apply data science principles to security operationsโanalyzing massive log datasets, identifying attack patterns through statistical modeling, and creating predictive models for threat intelligence.
AI-Powered Security:
- Automated threat hunting workflows using SIEM platforms (Splunk, ELK)
- ML-based anomaly detection for network traffic analysis
- Statistical modeling for attack pattern identification
- Predictive models for threat intelligence
Blockchain Security:
- Smart contract auditing and vulnerability assessment
- Decentralized systems security analysis
- DeFi protocol security testing
- Flash loan attack analysis and mitigation
Traditional Security Operations:
- Vulnerability assessment and penetration testing
- Incident response and threat hunting
- Log analysis and security monitoring
- Web application security testing
Emerging Technologies:
- Securing AI/ML models against adversarial attacks
- Data poisoning and model manipulation defense
- AI system security in enterprise infrastructure
Proficient in automating security workflows with Python, implementing AI-powered detection rules, and leveraging frameworks like MITRE ATT&CK for threat modeling. I focus on scalable, data-driven security solutions that adapt to evolving threat landscapes through continuous learning and automation.
Currently seeking opportunities to:
- Apply AI and machine learning to cybersecurity challenges
- Build intelligent defense systems
- Develop automated threat detection platforms
- Secure AI-powered applications in dynamic environments
- Wireshark โ Packet capture, protocol analysis, traffic inspection
- Nmap โ Port scanning, service enumeration, OS fingerprinting
- Tcpdump โ Command-line packet analysis
- Nessus โ Vulnerability scanning, compliance auditing
- OpenVAS โ Network vulnerability assessment
- Nikto โ Web server scanning
- Burp Suite โ Web app testing, proxy interception, SQL injection, XSS
- Metasploit โ Exploitation framework, payload delivery
- Hydra โ Password cracking, brute force attacks
- Slither โ Smart contract static analysis
- Foundry โ Testing, fuzzing, exploit development
- Mythril โ EVM bytecode analysis
- Splunk โ Log analysis, threat detection
- ELK Stack (Elasticsearch, Logstash, Kibana) โ Centralized logging, visualization
Languages: Python, Bash, Solidity, JavaScript, SQL, Rust
- OWASP Top 10 โ Web application security
- NIST Cybersecurity Framework โ Security controls and compliance
- MITRE ATT&CK โ Threat modeling and detection
- ๐ Vulnerability Assessment & Penetration Testing
- ๐ Network Security & Traffic Analysis
- ๐จ Incident Response & Threat Hunting
- ๐ Log Analysis & SIEM Operations
- ๐ Web Application Security (OWASP Top 10)
- โ๏ธ Smart Contract Security & Blockchain Auditing
- ๐ค AI/ML for Security Applications
- ๐ง Security Automation & Scripting
Since 2021, I've been actively involved in blockchain and cryptocurrency ecosystems, managing portfolios exceeding $80K and participating in early-stage testnet deployments.
Testnet Participation:
- Extensively tested on Sepolia and Goerli networks with ETH
- Smart contract deployments and interactions
- Protocol testing and security analysis
Base Testnet Camp:
- Completed hands-on challenges
- Contributed to Base ecosystem testing
- Repository: Base-camp-testnet
Early-Stage Projects:
- Engaged in alpha/beta testing for protocols like:
- zkSync
- Starknet
- Stargate
- Focus on security, functionality, and performance
Portfolio Management:
- Managed diverse crypto assets ($80K+)
- Implemented risk assessment strategies
- Monitored market dynamics and security best practices
This experience complements my smart contract auditing work, providing real-world insights into DeFi vulnerabilities and blockchain security best practices.
Gannon University | Erie, PA | January 2025 โ December 2025
- ๐ฅ๏ธ Manage Kali Linux VMs for 40+ students; automate setup with Bash scripts
- ๐จโ๐ซ Teach hands-on labs covering:
- Wireshark packet analysis
- Network subnetting
- OSI model concepts
- Security tool usage
- ๐ค Provide technical support and mentorship to cybersecurity students
- ๐ Assist with curriculum development and lab exercises
BSides Rock Conference | Rochester, PA | June 2024
- ๐ฏ Supported 300+ attendees with registration, tech setup, and networking
- ๐ Participated in cybersecurity track sessions and workshops
- ๐ Awarded Participation Certificate for contributions to conference success
- ๐ Networked with industry professionals and security researchers
๐ก๏ธ SIEM Dashboard โญ NEW
Real-Time Security Information and Event Management System
Comprehensive SIEM dashboard built with ELK Stack for automated threat detection and security monitoring.
Technologies: Elasticsearch, Logstash, Kibana, Docker, Python
Key Features:
- โ Real-time log aggregation from multiple sources (10,000+ events/sec)
- โ
5 custom detection rules:
- Brute Force Attack Detection
- SQL Injection Detection
- Port Scanning Detection
- Data Exfiltration Detection
- Privilege Escalation Detection
- โ MITRE ATT&CK framework integration
- โ Automated email/webhook alerting
- โ Geographic threat visualization with GeoIP enrichment
- โ Professional dashboard with Kibana visualizations
Impact: Processes 10,000+ events/sec | Detects threats in <1 minute | Automated incident response
๐ Vulnerability Scanner โญ NEW
Automated Network & Web Application Security Scanner
Python-based vulnerability scanner with multi-threaded port scanning and professional PDF reporting.
Technologies: Python, Socket Programming, ReportLab, Multi-threading
Capabilities:
- โ Multi-threaded TCP port scanning (up to 65,535 ports)
- โ Service detection and version fingerprinting
- โ
Web vulnerability testing:
- SQL Injection detection
- Cross-Site Scripting (XSS)
- Security headers validation
- โ SSL/TLS certificate analysis and grading
- โ Professional PDF report generation with findings
- โ JSON export for automation integration
Achievements: Identified 8 CVEs in test environments | Used in 5+ security audits
Secure Smart Contract Auditing Project
Comprehensive security audit of Ethereum staking contract with vulnerability remediation.
Technologies: Solidity, JavaScript, Hardhat, Slither, Sepolia Testnet
Security Findings:
- ๐ด Critical: Reentrancy vulnerability in withdraw function
- ๐ก High: Access control flaws allowing unauthorized actions
- ๐ข Medium: Gas optimization opportunities
Remediation:
- โ Fixed reentrancy using ReentrancyGuard pattern
- โ Implemented proper access control mechanisms
- โ Optimized gas usage
- โ Deployed secure version to Sepolia testnet
Impact: Successfully secured staking contract handling real assets
DeFi Security Research
Proof-of-concept demonstrating flash loan attack vectors in DeFi protocols.
Technologies: Solidity, Foundry, Rust, Web3.js
Key Features:
- โก Built exploit draining vault in <60 seconds
- ๐ฏ Demonstrated price oracle manipulation vulnerability
- ๐ Created comprehensive 5-page mitigation report
- ๐ก๏ธ Recommended TWAP and circuit breaker fixes
Learning Outcomes:
- Flash loan mechanics and attack vectors
- Price oracle vulnerabilities
- MEV (Maximal Extractable Value) concepts
- DeFi security best practices
๐ Base Camp Testnet
Blockchain Testnet Deployment
Hands-on blockchain testnet project exploring Base network capabilities.
Technologies: Base Network, Smart Contracts, Ethereum
Activities:
- Completed Base ecosystem challenges
- Deployed and tested smart contracts
- Participated in testnet validation
Hands-On Cybersecurity Training
Comprehensive security testing and analysis projects:
Network Analysis:
- ๐ก Captured and analyzed malicious traffic with Wireshark
- ๐ Performed network reconnaissance using Nmap
- ๐ก๏ธ Conducted vulnerability scans with Nessus
Web Application Security:
- ๐ Tested web apps for OWASP Top 10 vulnerabilities
- ๐ง Used Burp Suite for penetration testing
- ๐ฏ Identified SQL injection, XSS, and CSRF vulnerabilities
Gannon University | Erie, PA | Expected 2025
Specializing in:
- Advanced threat detection and response
- Security automation and orchestration
- Cloud security (AWS)
- Malware analysis and reverse engineering
Amrita Vishwa Vidyapeetham | India | 2019 - 2023
Key Coursework:
- Machine Learning and Deep Learning
- Data Science and Analytics
- Neural Networks
- Computer Vision
- Natural Language Processing
Skills Gained:
- AI/ML model development
- Python programming
- Data analysis and visualization
- Statistical modeling
- ๐ฏ CompTIA Security+
- โ๏ธ AWS Certified Security โ Specialty
- ๐ Certified Ethical Hacker (CEH)
- ๐ BSides Rock Conference - Participation Certificate (June 2024)
Cloud Security:
- โ๏ธ AWS security best practices
- ๐ IAM policies and access control
- ๐ก๏ธ Cloud infrastructure hardening
- ๐ CloudTrail and security monitoring
Malware Analysis & Reverse Engineering:
- ๐ฆ Malware behavior analysis
- ๐ฌ Static and dynamic analysis techniques
- ๐ ๏ธ Debugging and disassembly
- ๐ Threat intelligence integration
SIEM Implementation & Threat Hunting:
- ๐ Advanced Splunk queries
- ๐ Threat hunting methodologies
- ๐ฏ Custom detection rule creation
- ๐ Security metrics and KPIs
Advanced Topics:
- ๐ค AI/ML for security applications
- โ๏ธ Advanced smart contract security
- ๐ Zero Trust architecture
- ๐จ Security automation and SOAR
- ๐ Secure Cybersecurity Analyst or SOC Analyst position
- ๐ Complete CompTIA Security+ and AWS Security certifications
- ๐ Build and deploy advanced security automation tools
- ๐ค Contribute to open-source security projects
- ๐ Complete Master's degree in Cybersecurity
- ๐ Achieve OSCP (Offensive Security Certified Professional)
- ๐ผ Progress to Senior Security Analyst or Penetration Tester role
- ๐ Publish security research and blog posts
- ๐ Lead security operations team
- ๐ฏ Specialize in AI-powered security solutions
- ๐ Become recognized expert in blockchain security
- ๐จโ๐ซ Mentor aspiring cybersecurity professionals
- โ $80K+ Portfolio Management - Cryptocurrency and blockchain investments
- โ 300+ Conference Attendees Supported - BSides Rock Conference
- โ 40+ Students Mentored - Cybersecurity Lab Assistant at Gannon University
- โ 8 CVEs Identified - Through vulnerability scanning and testing
- โ 10,000+ Events/Sec - SIEM dashboard processing capacity
- โ <1 Minute Threat Detection - Real-time security monitoring
- โ Smart Contract Auditing - Multiple Ethereum contracts secured
- โ Flash Loan Exploit Demo - Educational security research
I'm actively seeking opportunities in:
- ๐ Cybersecurity Analyst
- ๐จ SOC Analyst (Security Operations Center)
- ๐ก๏ธ Security Engineer
- ๐ Threat Hunter
- โ๏ธ Blockchain Security Analyst
- Full-time positions
- Contract/consulting work
- Security research collaborations
- Open-source contributions
- Speaking at conferences/meetups
- AI/ML applications in cybersecurity
- Blockchain and smart contract security
- Threat detection and hunting strategies
- Security automation and SOAR
- Emerging cybersecurity threats and trends
๐ง Email: harshanandhanreddy820@gmail.com
๐ฑ Phone: +1 (814) 504-1946
๐ผ LinkedIn: Harshanandhan
๐ฆ Twitter: @Nandhanreddyy
๐ GitHub: @Harshanandhan
๐ Location: USA
- ๐ฎ CTF Enthusiast - Participate in Capture The Flag competitions
- ๐ Continuous Learner - Always exploring new security tools and techniques
- โ๏ธ Crypto Native - Active in blockchain since 2021
- ๐ค AI Advocate - Applying ML to solve cybersecurity challenges
- ๐ง Open Source Contributor - Building tools for the community
- ๐ฏ Challenge Seeker - Love solving complex security puzzles
Let's build secure, intelligent systems together!
โญ If you find my work interesting, consider starring my repositories!
Last Updated: December 28, 2024
Status: Actively seeking Cybersecurity Analyst / SOC Analyst / Penetration Tester roles