Skip to content
View Harshanandhan's full-sized avatar

Block or report Harshanandhan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
Harshanandhan/README.md

HARSHANANDHAN REDDY GAJULAPALLI

Cybersecurity Analyst | Pennsylvania, USA | Open to Work

Email LinkedIn Twitter GitHub Phone


๐Ÿ‘จโ€๐Ÿ’ป About Me

Cybersecurity Analyst with a strong foundation in Artificial Intelligence and Machine Learning, specializing in intelligent threat detection, automated security analysis, and next-generation defense systems. I leverage AI-driven approaches to enhance vulnerability assessment, anomaly detection, and security automationโ€”combining traditional cybersecurity practices with cutting-edge machine learning techniques.

๐ŸŽฏ Core Expertise

My expertise spans building intelligent security solutions: from developing automated threat hunting workflows using SIEM platforms like Splunk to implementing ML-based anomaly detection for network traffic analysis. I apply data science principles to security operationsโ€”analyzing massive log datasets, identifying attack patterns through statistical modeling, and creating predictive models for threat intelligence.

๐Ÿ” Specialized Focus Areas

AI-Powered Security:

  • Automated threat hunting workflows using SIEM platforms (Splunk, ELK)
  • ML-based anomaly detection for network traffic analysis
  • Statistical modeling for attack pattern identification
  • Predictive models for threat intelligence

Blockchain Security:

  • Smart contract auditing and vulnerability assessment
  • Decentralized systems security analysis
  • DeFi protocol security testing
  • Flash loan attack analysis and mitigation

Traditional Security Operations:

  • Vulnerability assessment and penetration testing
  • Incident response and threat hunting
  • Log analysis and security monitoring
  • Web application security testing

Emerging Technologies:

  • Securing AI/ML models against adversarial attacks
  • Data poisoning and model manipulation defense
  • AI system security in enterprise infrastructure

๐Ÿš€ Current Focus

Proficient in automating security workflows with Python, implementing AI-powered detection rules, and leveraging frameworks like MITRE ATT&CK for threat modeling. I focus on scalable, data-driven security solutions that adapt to evolving threat landscapes through continuous learning and automation.

Currently seeking opportunities to:

  • Apply AI and machine learning to cybersecurity challenges
  • Build intelligent defense systems
  • Develop automated threat detection platforms
  • Secure AI-powered applications in dynamic environments

๐Ÿ› ๏ธ Security Tools & Technologies

๐ŸŒ Network & Traffic Analysis

Wireshark Nmap tcpdump

  • Wireshark โ€” Packet capture, protocol analysis, traffic inspection
  • Nmap โ€” Port scanning, service enumeration, OS fingerprinting
  • Tcpdump โ€” Command-line packet analysis

๐Ÿ” Vulnerability Assessment

Nessus OpenVAS Nikto

  • Nessus โ€” Vulnerability scanning, compliance auditing
  • OpenVAS โ€” Network vulnerability assessment
  • Nikto โ€” Web server scanning

๐ŸŽฏ Penetration Testing

Burp Suite Metasploit Hydra

  • Burp Suite โ€” Web app testing, proxy interception, SQL injection, XSS
  • Metasploit โ€” Exploitation framework, payload delivery
  • Hydra โ€” Password cracking, brute force attacks

โ›“๏ธ Blockchain Security

Slither Foundry Mythril

  • Slither โ€” Smart contract static analysis
  • Foundry โ€” Testing, fuzzing, exploit development
  • Mythril โ€” EVM bytecode analysis

๐Ÿ“Š SIEM & Monitoring

Splunk ELK Stack

  • Splunk โ€” Log analysis, threat detection
  • ELK Stack (Elasticsearch, Logstash, Kibana) โ€” Centralized logging, visualization

๐Ÿ’ป Platforms & Operating Systems

Kali Linux Ubuntu Windows Server AWS Docker


๐Ÿ’ป Technical Skills

Programming & Scripting

Python Bash Solidity JavaScript SQL Rust

Languages: Python, Bash, Solidity, JavaScript, SQL, Rust

Security Frameworks & Standards

  • OWASP Top 10 โ€” Web application security
  • NIST Cybersecurity Framework โ€” Security controls and compliance
  • MITRE ATT&CK โ€” Threat modeling and detection

Core Competencies

  • ๐Ÿ” Vulnerability Assessment & Penetration Testing
  • ๐ŸŒ Network Security & Traffic Analysis
  • ๐Ÿšจ Incident Response & Threat Hunting
  • ๐Ÿ“Š Log Analysis & SIEM Operations
  • ๐ŸŒ Web Application Security (OWASP Top 10)
  • โ›“๏ธ Smart Contract Security & Blockchain Auditing
  • ๐Ÿค– AI/ML for Security Applications
  • ๐Ÿ”ง Security Automation & Scripting

โ›“๏ธ Blockchain & Cryptocurrency Experience

Since 2021, I've been actively involved in blockchain and cryptocurrency ecosystems, managing portfolios exceeding $80K and participating in early-stage testnet deployments.

๐Ÿ”‘ Key Highlights:

Testnet Participation:

  • Extensively tested on Sepolia and Goerli networks with ETH
  • Smart contract deployments and interactions
  • Protocol testing and security analysis

Base Testnet Camp:

  • Completed hands-on challenges
  • Contributed to Base ecosystem testing
  • Repository: Base-camp-testnet

Early-Stage Projects:

  • Engaged in alpha/beta testing for protocols like:
    • zkSync
    • Starknet
    • Stargate
  • Focus on security, functionality, and performance

Portfolio Management:

  • Managed diverse crypto assets ($80K+)
  • Implemented risk assessment strategies
  • Monitored market dynamics and security best practices

This experience complements my smart contract auditing work, providing real-world insights into DeFi vulnerabilities and blockchain security best practices.


๐Ÿ’ผ Professional Experience

Cybersecurity Lab Assistant

Gannon University | Erie, PA | January 2025 โ€“ December 2025

  • ๐Ÿ–ฅ๏ธ Manage Kali Linux VMs for 40+ students; automate setup with Bash scripts
  • ๐Ÿ‘จโ€๐Ÿซ Teach hands-on labs covering:
    • Wireshark packet analysis
    • Network subnetting
    • OSI model concepts
    • Security tool usage
  • ๐Ÿค Provide technical support and mentorship to cybersecurity students
  • ๐Ÿ“š Assist with curriculum development and lab exercises

Conference Volunteer

BSides Rock Conference | Rochester, PA | June 2024

  • ๐ŸŽฏ Supported 300+ attendees with registration, tech setup, and networking
  • ๐Ÿ“– Participated in cybersecurity track sessions and workshops
  • ๐Ÿ† Awarded Participation Certificate for contributions to conference success
  • ๐Ÿ”— Networked with industry professionals and security researchers

๐Ÿš€ Featured Projects

๐Ÿ›ก๏ธ SIEM Dashboard โญ NEW

Real-Time Security Information and Event Management System

Comprehensive SIEM dashboard built with ELK Stack for automated threat detection and security monitoring.

Technologies: Elasticsearch, Logstash, Kibana, Docker, Python

Key Features:

  • โœ… Real-time log aggregation from multiple sources (10,000+ events/sec)
  • โœ… 5 custom detection rules:
    • Brute Force Attack Detection
    • SQL Injection Detection
    • Port Scanning Detection
    • Data Exfiltration Detection
    • Privilege Escalation Detection
  • โœ… MITRE ATT&CK framework integration
  • โœ… Automated email/webhook alerting
  • โœ… Geographic threat visualization with GeoIP enrichment
  • โœ… Professional dashboard with Kibana visualizations

Impact: Processes 10,000+ events/sec | Detects threats in <1 minute | Automated incident response


๐Ÿ” Vulnerability Scanner โญ NEW

Automated Network & Web Application Security Scanner

Python-based vulnerability scanner with multi-threaded port scanning and professional PDF reporting.

Technologies: Python, Socket Programming, ReportLab, Multi-threading

Capabilities:

  • โœ… Multi-threaded TCP port scanning (up to 65,535 ports)
  • โœ… Service detection and version fingerprinting
  • โœ… Web vulnerability testing:
    • SQL Injection detection
    • Cross-Site Scripting (XSS)
    • Security headers validation
  • โœ… SSL/TLS certificate analysis and grading
  • โœ… Professional PDF report generation with findings
  • โœ… JSON export for automation integration

Achievements: Identified 8 CVEs in test environments | Used in 5+ security audits


Secure Smart Contract Auditing Project

Comprehensive security audit of Ethereum staking contract with vulnerability remediation.

Technologies: Solidity, JavaScript, Hardhat, Slither, Sepolia Testnet

Security Findings:

  • ๐Ÿ”ด Critical: Reentrancy vulnerability in withdraw function
  • ๐ŸŸก High: Access control flaws allowing unauthorized actions
  • ๐ŸŸข Medium: Gas optimization opportunities

Remediation:

  • โœ… Fixed reentrancy using ReentrancyGuard pattern
  • โœ… Implemented proper access control mechanisms
  • โœ… Optimized gas usage
  • โœ… Deployed secure version to Sepolia testnet

Impact: Successfully secured staking contract handling real assets


DeFi Security Research

Proof-of-concept demonstrating flash loan attack vectors in DeFi protocols.

Technologies: Solidity, Foundry, Rust, Web3.js

Key Features:

  • โšก Built exploit draining vault in <60 seconds
  • ๐ŸŽฏ Demonstrated price oracle manipulation vulnerability
  • ๐Ÿ“Š Created comprehensive 5-page mitigation report
  • ๐Ÿ›ก๏ธ Recommended TWAP and circuit breaker fixes

Learning Outcomes:

  • Flash loan mechanics and attack vectors
  • Price oracle vulnerabilities
  • MEV (Maximal Extractable Value) concepts
  • DeFi security best practices

Blockchain Testnet Deployment

Hands-on blockchain testnet project exploring Base network capabilities.

Technologies: Base Network, Smart Contracts, Ethereum

Activities:

  • Completed Base ecosystem challenges
  • Deployed and tested smart contracts
  • Participated in testnet validation

๐ŸŒ Network Security Labs

Hands-On Cybersecurity Training

Comprehensive security testing and analysis projects:

Network Analysis:

  • ๐Ÿ“ก Captured and analyzed malicious traffic with Wireshark
  • ๐Ÿ” Performed network reconnaissance using Nmap
  • ๐Ÿ›ก๏ธ Conducted vulnerability scans with Nessus

Web Application Security:

  • ๐ŸŒ Tested web apps for OWASP Top 10 vulnerabilities
  • ๐Ÿ”ง Used Burp Suite for penetration testing
  • ๐ŸŽฏ Identified SQL injection, XSS, and CSRF vulnerabilities

๐Ÿ“Š GitHub Statistics

GitHub Stats

Top Languages

GitHub Streak


๐ŸŽ“ Education

Master of Science in Cybersecurity

Gannon University | Erie, PA | Expected 2025

Specializing in:

  • Advanced threat detection and response
  • Security automation and orchestration
  • Cloud security (AWS)
  • Malware analysis and reverse engineering

Bachelor of Technology in Artificial Intelligence & Machine Learning

Amrita Vishwa Vidyapeetham | India | 2019 - 2023

Key Coursework:

  • Machine Learning and Deep Learning
  • Data Science and Analytics
  • Neural Networks
  • Computer Vision
  • Natural Language Processing

Skills Gained:

  • AI/ML model development
  • Python programming
  • Data analysis and visualization
  • Statistical modeling

๐Ÿ“œ Certifications

In Progress:

  • ๐ŸŽฏ CompTIA Security+
  • โ˜๏ธ AWS Certified Security โ€“ Specialty
  • ๐Ÿ”’ Certified Ethical Hacker (CEH)

Completed:

  • ๐Ÿ† BSides Rock Conference - Participation Certificate (June 2024)

๐ŸŒฑ Currently Learning

Active Focus Areas:

Cloud Security:

  • โ˜๏ธ AWS security best practices
  • ๐Ÿ” IAM policies and access control
  • ๐Ÿ›ก๏ธ Cloud infrastructure hardening
  • ๐Ÿ“Š CloudTrail and security monitoring

Malware Analysis & Reverse Engineering:

  • ๐Ÿฆ  Malware behavior analysis
  • ๐Ÿ”ฌ Static and dynamic analysis techniques
  • ๐Ÿ› ๏ธ Debugging and disassembly
  • ๐Ÿ” Threat intelligence integration

SIEM Implementation & Threat Hunting:

  • ๐Ÿ“Š Advanced Splunk queries
  • ๐Ÿ” Threat hunting methodologies
  • ๐ŸŽฏ Custom detection rule creation
  • ๐Ÿ“ˆ Security metrics and KPIs

Advanced Topics:

  • ๐Ÿค– AI/ML for security applications
  • โ›“๏ธ Advanced smart contract security
  • ๐Ÿ” Zero Trust architecture
  • ๐Ÿšจ Security automation and SOAR

๐ŸŽฏ Career Goals

Immediate :

  • ๐Ÿ” Secure Cybersecurity Analyst or SOC Analyst position
  • ๐Ÿ“œ Complete CompTIA Security+ and AWS Security certifications
  • ๐Ÿš€ Build and deploy advanced security automation tools
  • ๐Ÿค Contribute to open-source security projects

Mid-Term (2026-2027):

  • ๐ŸŽ“ Complete Master's degree in Cybersecurity
  • ๐Ÿ† Achieve OSCP (Offensive Security Certified Professional)
  • ๐Ÿ’ผ Progress to Senior Security Analyst or Penetration Tester role
  • ๐Ÿ“ Publish security research and blog posts

Long-Term Vision:

  • ๐Ÿ” Lead security operations team
  • ๐ŸŽฏ Specialize in AI-powered security solutions
  • ๐ŸŒŸ Become recognized expert in blockchain security
  • ๐Ÿ‘จโ€๐Ÿซ Mentor aspiring cybersecurity professionals

๐Ÿ† Achievements & Highlights

  • โœ… $80K+ Portfolio Management - Cryptocurrency and blockchain investments
  • โœ… 300+ Conference Attendees Supported - BSides Rock Conference
  • โœ… 40+ Students Mentored - Cybersecurity Lab Assistant at Gannon University
  • โœ… 8 CVEs Identified - Through vulnerability scanning and testing
  • โœ… 10,000+ Events/Sec - SIEM dashboard processing capacity
  • โœ… <1 Minute Threat Detection - Real-time security monitoring
  • โœ… Smart Contract Auditing - Multiple Ethereum contracts secured
  • โœ… Flash Loan Exploit Demo - Educational security research

๐Ÿค Let's Connect!

I'm actively seeking opportunities in:

๐ŸŽฏ Target Roles:

  • ๐Ÿ” Cybersecurity Analyst
  • ๐Ÿšจ SOC Analyst (Security Operations Center)
  • ๐Ÿ›ก๏ธ Security Engineer
  • ๐Ÿ” Threat Hunter
  • โ›“๏ธ Blockchain Security Analyst

๐Ÿ’ก Open to:

  • Full-time positions
  • Contract/consulting work
  • Security research collaborations
  • Open-source contributions
  • Speaking at conferences/meetups

๐ŸŒŸ Interested in discussing:

  • AI/ML applications in cybersecurity
  • Blockchain and smart contract security
  • Threat detection and hunting strategies
  • Security automation and SOAR
  • Emerging cybersecurity threats and trends

๐Ÿ“ซ Contact Information

Get In Touch

๐Ÿ“ง Email: harshanandhanreddy820@gmail.com

๐Ÿ“ฑ Phone: +1 (814) 504-1946

๐Ÿ’ผ LinkedIn: Harshanandhan

๐Ÿฆ Twitter: @Nandhanreddyy

๐Ÿ™ GitHub: @Harshanandhan

๐Ÿ“ Location: USA


โšก Fun Facts

  • ๐ŸŽฎ CTF Enthusiast - Participate in Capture The Flag competitions
  • ๐Ÿ“š Continuous Learner - Always exploring new security tools and techniques
  • โ›“๏ธ Crypto Native - Active in blockchain since 2021
  • ๐Ÿค– AI Advocate - Applying ML to solve cybersecurity challenges
  • ๐Ÿ”ง Open Source Contributor - Building tools for the community
  • ๐ŸŽฏ Challenge Seeker - Love solving complex security puzzles

๐Ÿ’ป "The best defense is a good offense combined with intelligent automation"

Let's build secure, intelligent systems together!

Visitor Count

โญ If you find my work interesting, consider starring my repositories!


Last Updated: December 28, 2024
Status: Actively seeking Cybersecurity Analyst / SOC Analyst / Penetration Tester roles


Pinned Loading

  1. Smart-contract-ai-detector Smart-contract-ai-detector Public

    AI/ML-powered smart contract vulnerability detector for Ethereum and EVM chains. Detects reentrancy, access control issues, unchecked calls, timestamp dependence, and tx.origin vulnerabilities usinโ€ฆ

    Python

  2. vulnerability-scanner vulnerability-scanner Public

    Python-based vulnerability scanner for network and web security assessment. Features port scanning, service detection, SQL injection/XSS testing, SSL analysis, and PDF reporting. Security Analyst pโ€ฆ

    Python

  3. Siem-dashboard Siem-dashboard Public

    comprehensive SIEM solution using ELK Stack for real-time security monitoring and threat detection

    Python

  4. vuln-scanner vuln-scanner Public

    ๐Ÿ›ก๏ธ Network Vulnerability Scanner | Automated Nmap + NSE across 100+ hosts | Detected 15+ ports & 8 CVEs | JSON export for Splunk/SIEM

  5. eth-staking-audit eth-staking-audit Public

    ๐Ÿ”’ Secure ERC-20 staking contract in Solidity | Slither audited | Deployed to Sepolia testnet | Fixed reentrancy & access control vulnerabilities

    JavaScript

  6. dvde-flash-loan-exploit dvde-flash-loan-exploit Public

    โšก DVDE Flash Loan Exploit | Drained vault in <60s using Foundry + Rust | 5-page mitigation report included