Post Job Free
Sign in

Security Analyst Incident Response

Location:
Denton, TX
Posted:
June 11, 2025

Contact this candidate

Resume:

ABETT REDDY CHERUKU

+1-940-***-**** *****************@*****.*** LinkedIn

Location: Open to relocating to Grapevine, TX Work Authorization: F1 OPT

---

PROFESSIONAL SUMMARY

Security Analyst with strong foundational experience in alert monitoring, incident response, SIEM analysis, and vulnerability management. Proficient in using tools like Splunk, Nessus, Snort, and Burp Suite to detect, triage, and mitigate security threats. Familiar with common threat actor techniques, ticketing systems, and collaborative SOC environments. Passionate about cybersecurity operations, continuous learning, and protecting enterprise systems.

---

CERTIFICATIONS

Certified Ethical Hacker (CEH)

CompTIA Security+ (Expected Dec 2024)

Cisco Introduction to Cybersecurity

---

EDUCATION

Master of Science in Cybersecurity

University of North Texas, Denton, TX — Expected Dec 2024

---

TECHNICAL SKILLS

SOC Tools: Splunk, Snort, Nessus, Burp Suite, Nikto

Security Operations: Alert Review, Incident Response, Ticket Management, Triage

Threat Intelligence: MITRE ATT&CK, Threat Actor Behavior, XSS, SQLi, Buffer Overflow

Platforms: Windows, Linux, Raspberry Pi, TCP/IP Networking

Scripting: Python, Bash

Processes: Vulnerability Management, Penetration Testing, IDS/IPS, WAF Integration

Communication: Incident Documentation, Cross-Team Collaboration, Technical Reports

---

PROFESSIONAL EXPERIENCE

Security Researcher

Sistmar Australia — Jun 2021 – Aug 2021

Responded to security events using SIEM tools and performed manual incident analysis.

Conducted penetration testing on 15+ applications using Nessus, Burp Suite, and custom scripts.

Developed security protocols and enhanced response time by creating standardized alert-handling workflows.

Identified and mitigated risks aligned with OWASP Top 10 and vulnerability scan findings.

Cybersecurity Analyst

Traceley Inc. — Jan 2020 – Apr 2020

Monitored and analyzed logs using Splunk and Snort; escalated verified incidents for mitigation.

Investigated security anomalies and collaborated with IT to validate suspicious user activity.

Tuned alert rules, documented incidents, and coordinated remediation actions.

Conducted compliance-based assessments and participated in low-level security architecture reviews.

---

ACADEMIC PROJECTS

SOC Threat Monitoring Lab — University of North Texas

Simulated 24/7 SOC with real-time alert monitoring, incident ticketing, and response drills.

Used Nessus and Splunk to detect threats like SQL Injection and Cross-Site Scripting (XSS).

Documented events, conducted root cause analysis, and improved detection rules.

Custom Linux Security Distro for Pen Testing

Integrated 50+ tools (Metasploit, Nikto, Burp Suite) for application and infrastructure scanning.

Scripted automated scans in Python and Bash to reduce manual security assessments.

Intrusion Detection System on Raspberry Pi

Built and configured Snort IDS on Raspberry Pi with custom rule sets.

Designed system to detect buffer overflows, XSS, and insecure deserialization.

Implemented logging and forensic-ready event tracking.



Contact this candidate