CHITRA SAI KUMAR
Software Enthusiast
Phone: +91-916******* Email: ****************@*****.*** LinkedIn: https://www.linkedin.com/in/chitra-sai-kumar-1324b6352/
Profile Summary
Good at Python and SQL with hands-on experience in backend development and working with databases. Can write clean code, manage data, and solve problems using Python. Comfortable with SQL queries and organizing data for applications. Know basic cybersecurity concepts like vulnerability assessment and pentesting. Familiar with tools like Nmap, Burp Suite, and Wireshark. Work well in teams, communicate clearly, and always ready to learn and improve Technical Skills
Category
Skills
Programming Languages
Python 3.9 (Data Analysis, Scripting, Backend development).
Database Management
SQL (Query writing, data retrieval, relational data base design).
Cybersecurity Basics
Vulnerability assessment, penetration testing concepts.
Security Tools
Nmap, Burp suite, Wireshark, OWASP top 10.
Platforms
Windows, Kali Linux.
Version Control
GIT, GITHUB.
Defect Tracking Tools & Method
JIRA, Confluence, Agile Methodology.
Soft Skills
Problem Solving, Self-learning, Adaptability, Communication Skills, Time Management.
Certificates
Deloitte Australia – Cyber Job Simulation
Education
BTech in Electronics and Communication Engineering 2021-2025
Jawaharlal Nehru Technological University, Kakinada, A.P., India
Intermediate, MPC 2019-2021
Sri Sai Krupa Junior College, A.P, India
Project Details
Project #1: Migration of Information to Azure
Project Name
DSB Azure Migration
Customer
DSB (Danske Statsbaner), Denmark Train Operating Company.
Description
DSB processes the SQL SERVER, and SFTP server data by running the Informatica ETL tool. During the Migration, DSB’s on-premises SQL Server and Informatica ETL components migrated into Microsoft Azure
components by creating Databricks Notebooks with PySpark Code and SparkSQL. ADF pipelines are built by
creating different logical activities to integrate and Process the Data from the Staging Layer to the Processing layer as per business requirements. Azure DevOps is used to create CI-CD Pipelines for deploying the ADB and ADF.
Tools Used
SQL Server, Informatica, Databricks, Azure Data Factory, ADLS, Azure DevOps, GitHub, JIRA.
Programming Languages
PySpark, SQL, Python
Responsibilities
Analyzing the Information components like Workflows, Mappings, Source Tables, lookups, Expression Transformations, Routers, Target Tables, etc.
Creating Delta Tables in Azure Data Lake by executing DDL’s on Databricks.
Understanding Of Data flowing by using High-level design architecture.
Creation of Databricks Notebooks with PySpark and SparkSQL for ingestion, extraction, transformations, and data loading into the processing layer.
Involved in creating the ADF pipelines for history and incremental loads as per business requirements.
Involved in creating triggers to trigger the ADF pipelines on scheduled time.
Running of DevOps CI-CD Pipelines to deploy the ADB and ADF.
Project #2: Offensive Security Assessment of Live Web Application
Project Name
Web Application Vulnerability Assessment
Customer
Internal Security Initiative (Confidential Web Application)
Description
Conducted a comprehensive security assessment of a live web application using both manual and automated techniques. The objective was to identify and responsibly disclose critical vulnerabilities that could impact the application's confidentiality, integrity, and availability. The assessment focused on DNS-level misconfigurations and missing security headers, aligning with OWASP Top 10 and CVE standards. Recommendations were provided to the development team, and fixes were validated post-remediation.
Tools Used
Burp Suite, Nmap, Manual Security Testing.
Technologies & Standards
OWASP TOP 10, CVE, CVSS
Responsibilities
Performed manual and automated penetration testing on a live production web application.
Identified DNSSEC misconfiguration leading to DNS spoofing and cache poisoning risks (CVE-2008-1447, CVSS 7.5 High)
Detected missing security headers (X-Frame-Options, Content-Security-Policy) resulting in click jacking vulnerabilities (OWASP A07:2021, CVSS 6.5 Medium)
Documented findings with detailed impact analysis and remediation steps.
Conducted responsible disclosure by reporting vulnerabilities to the application owner.
Recommended secure header configurations and validated the implementation of fixes.
Used Burp suite for intercepting and analyzing HTTP traffic and Nmap for network scanning.