ABETT REDDY CHERUKU
+1-940-***-**** *****************@*****.*** LinkedIn
Location: Open to relocating to Grapevine, TX Work Authorization: F1 OPT
---
PROFESSIONAL SUMMARY
Security Analyst with strong foundational experience in alert monitoring, incident response, SIEM analysis, and vulnerability management. Proficient in using tools like Splunk, Nessus, Snort, and Burp Suite to detect, triage, and mitigate security threats. Familiar with common threat actor techniques, ticketing systems, and collaborative SOC environments. Passionate about cybersecurity operations, continuous learning, and protecting enterprise systems.
---
CERTIFICATIONS
Certified Ethical Hacker (CEH)
CompTIA Security+ (Expected Dec 2024)
Cisco Introduction to Cybersecurity
---
EDUCATION
Master of Science in Cybersecurity
University of North Texas, Denton, TX — Expected Dec 2024
---
TECHNICAL SKILLS
SOC Tools: Splunk, Snort, Nessus, Burp Suite, Nikto
Security Operations: Alert Review, Incident Response, Ticket Management, Triage
Threat Intelligence: MITRE ATT&CK, Threat Actor Behavior, XSS, SQLi, Buffer Overflow
Platforms: Windows, Linux, Raspberry Pi, TCP/IP Networking
Scripting: Python, Bash
Processes: Vulnerability Management, Penetration Testing, IDS/IPS, WAF Integration
Communication: Incident Documentation, Cross-Team Collaboration, Technical Reports
---
PROFESSIONAL EXPERIENCE
Security Researcher
Sistmar Australia — Jun 2021 – Aug 2021
Responded to security events using SIEM tools and performed manual incident analysis.
Conducted penetration testing on 15+ applications using Nessus, Burp Suite, and custom scripts.
Developed security protocols and enhanced response time by creating standardized alert-handling workflows.
Identified and mitigated risks aligned with OWASP Top 10 and vulnerability scan findings.
Cybersecurity Analyst
Traceley Inc. — Jan 2020 – Apr 2020
Monitored and analyzed logs using Splunk and Snort; escalated verified incidents for mitigation.
Investigated security anomalies and collaborated with IT to validate suspicious user activity.
Tuned alert rules, documented incidents, and coordinated remediation actions.
Conducted compliance-based assessments and participated in low-level security architecture reviews.
---
ACADEMIC PROJECTS
SOC Threat Monitoring Lab — University of North Texas
Simulated 24/7 SOC with real-time alert monitoring, incident ticketing, and response drills.
Used Nessus and Splunk to detect threats like SQL Injection and Cross-Site Scripting (XSS).
Documented events, conducted root cause analysis, and improved detection rules.
Custom Linux Security Distro for Pen Testing
Integrated 50+ tools (Metasploit, Nikto, Burp Suite) for application and infrastructure scanning.
Scripted automated scans in Python and Bash to reduce manual security assessments.
Intrusion Detection System on Raspberry Pi
Built and configured Snort IDS on Raspberry Pi with custom rule sets.
Designed system to detect buffer overflows, XSS, and insecure deserialization.
Implemented logging and forensic-ready event tracking.