Hello, I'mAbhishek Sangroula
Passionate about securing digital infrastructures and hunting threats. Specialized in network security, vulnerability assessment, and incident response with a strong foundation in IT and cybersecurity.
About Me
Professional Summary
I am a dedicated cybersecurity professional with a Bachelor's degree in Information Technology specializing in Network & Cybersecurity from TAFE NSW. My passion lies in protecting digital infrastructures and ensuring organizational security through proactive threat detection and response.
With expertise in penetration testing, security operations center analysis, and network security, I bring a comprehensive approach to cybersecurity challenges. My technical foundation spans across multiple platforms and security tools, enabling me to adapt to diverse environments and threats.
I am actively seeking opportunities as a Junior Penetration Tester or SOC Analyst where I can contribute my skills while continuing to grow in the ever-evolving cybersecurity landscape.
Career Objectives
Security Defense
Implement robust security measures to protect organizational assets from cyber threats and vulnerabilities.
Threat Hunting
Proactively identify and neutralize potential security threats before they can impact business operations.
Incident Response
Rapidly respond to security incidents with comprehensive analysis and effective mitigation strategies.
Penetration Testing
Conduct thorough security assessments to identify vulnerabilities and strengthen security posture.
Technical Skills
Comprehensive expertise across cybersecurity, networking, and IT infrastructure management
Software
Security Focus
Specialized in cybersecurity with emphasis on threat detection and prevention
Network Expertise
Strong foundation in network protocols and infrastructure management
Quick Adaptation
Fast learner with ability to adapt to new technologies and methodologies
Education & Certifications
Academic foundation and professional development in cybersecurity and information technology
Bachelor of Information Technology
Network & Cybersecurity Specialization
Comprehensive 4-year program focused on network security, cybersecurity fundamentals, and IT infrastructure management. Gained hands-on experience with industry-standard tools and methodologies in penetration testing, incident response, and security analysis.
Key Coursework
Certifications
CompTIA Security+
PursuingIndustry-standard cybersecurity certification
Certified Ethical Hacker (CEH)
PlannedAdvanced penetration testing certification
GCIH (Incident Handling)
PlannedSANS incident response certification
CISSP
Future GoalAdvanced security management certification
Cybersecurity Projects
Hands-on cybersecurity projects demonstrating practical skills in penetration testing, threat analysis, and security operations
Network Vulnerability Scanner
Automated network scanning tool built with Python to identify potential security vulnerabilities and misconfigurations in network infrastructure.
Tech Stack
Key Features
- Port scanning and service detection
- Vulnerability assessment
- Automated reporting
- Custom scan configurations
SIEM Log Analysis Dashboard
Real-time security incident monitoring dashboard for analyzing system logs and detecting anomalous activities using machine learning algorithms.
Tech Stack
Key Features
- Real-time log monitoring
- Anomaly detection
- Alert management
- Custom dashboards
Phishing Detection System
Machine learning-based email security system that identifies and classifies potential phishing attempts with high accuracy.
Tech Stack
Key Features
- Email content analysis
- URL reputation checking
- Machine learning classification
- Real-time protection
Incident Response Automation
Automated incident response framework that streamlines security incident handling and reduces response time through intelligent automation.
Tech Stack
Key Features
- Automated containment
- Evidence collection
- Notification system
- Playbook execution
Web Application Security Scanner
Comprehensive web application security testing tool that identifies OWASP Top 10 vulnerabilities and provides detailed remediation guidance.
Tech Stack
Key Features
- SQL injection detection
- XSS vulnerability scanning
- Authentication bypass testing
- Detailed security reports
Digital Forensics Toolkit
Collection of digital forensics tools for evidence acquisition, analysis, and reporting in cybersecurity investigations.
Tech Stack
Key Features
- Memory dump analysis
- Network packet inspection
- File system examination
- Timeline reconstruction
Interested in My Work?
These projects represent my practical approach to cybersecurity challenges. I'm always working on new projects and exploring emerging security technologies.
Let's Discuss ProjectsGet In Touch
Ready to contribute to your cybersecurity team. Let's discuss how I can help protect your organization.
Let's Connect
I'm actively seeking opportunities in cybersecurity roles including Junior Penetration Tester and SOC Analyst positions. Whether you have a job opportunity, want to discuss cybersecurity projects, or just want to connect, I'd love to hear from you.