Dark mode: OFF

Samyuktha Harshini Padmanabhuni

Fairfax, Virginia · (571) 436-0825 · samyukthaharshp@gmail.com

Hello! I'm Samyuktha Harshini Padmanabhuni, a recent graduate from George Mason University, where I earned my Master’s in Information Systems with a focus on Cybersecurity. I’m currently working as a Security Analyst Intern with PISTOS IT, a firm based in Atlanta. While it’s an unpaid role, it’s a treasure trove of hands-on experience, and I’m getting to apply my knowledge in real-world situations.

Right now, I'm on the lookout for Security Engineer and Security Analyst roles that will allow me to dive deeper into cybersecurity. I’m passionate about protecting data, identifying vulnerabilities, and building stronger, more resilient systems. My experience includes working with tools like Wireshark, Burp Suite, and Metasploit, and I have a knack for analyzing complex security issues, solving problems, and finding innovative ways to improve system defenses.

Aside from my technical skills, I bring a collaborative spirit to every team I join and am constantly looking for ways to enrich my skill set. If you're looking for a dedicated security professional with a genuine love for learning and a proactive approach to challenges, let’s connect!

TRY HACK ME

Experience

IT Security Engineer Intern

Pistos Technology

As an IT Security Engineer Intern, I conducted security assessments on various applications to identify and mitigate vulnerabilities, focusing on strengthening application security. My role involved developing and implementing secure coding practices, assisting in incident response, and providing guidance on security best practices to reduce risks of exploits and ensure data confidentiality and integrity.

I collaborated with cross-functional teams to design secure network architecture, conducted penetration testing, and applied industry-standard security frameworks to enhance the security posture of the organization. Additionally, I assisted in:

  • Configuring and managing cloud security tools, including firewalls and Cloud Security Posture Management tools.
  • Participating in incident response activities, including containment, eradication, and recovery efforts.
  • Securing Continuous Integration and Continuous Deployment (CI/CD) pipelines.
  • Conducting security code reviews and performing static/dynamic application security testing (SAST/DAST).
  • Collaborating with development teams to integrate security best practices into the application development lifecycle.
October 2024 - Present

Data Security Analyst

IBM

During my internship, I utilized IBM platforms and tools like Open Pages to effectively implement Governance, Risk, and Compliance practices. As part of a collaborative team effort, we developed controls for a company based on NIST and ISO protocols to safeguard employees from unnecessary privileges. My responsibilities encompassed managing account deletion and creation processes, ensuring proper privilege assignments within groups, and maintaining compliance with various privilege levels. Additionally, I gained proficiency in working with Active Directory.

January 2021 - July 2021

Teaching Assistant

GMU

I currently serve as a Teaching Assistant for the undergraduate course "Operating Systems and Labs" within the Cyber Security Engineering department. My responsibilities include assisting students with troubleshooting various lab errors, addressing conceptual misunderstandings, supporting SEED Labs activities, and evaluating assignments and exams.

January 2023 - May 2024

Projects

Content Book Recommendation and Semantic Analysis

Network Security Assessment using Nessus, Qualys, and Nmap

Technologies Used: Nmap, Nessus, Qualys, CVSS scoring

Description: Conducted network discovery and port scanning using Nmap to identify open ports and services across multiple hosts. Performed vulnerability scanning with Nessus and Qualys to detect and prioritize high-risk vulnerabilities.

Features:

  • Focused remediation efforts on high-severity issues based on CVSS scores.

Outcome: Improved overall security posture by identifying and addressing critical network vulnerabilities.

OWASP Top 10 Vulnerability Assessment

Technologies Used: Burp Suite, SQL Injection, XSS

Description: Performed a vulnerability assessment on a web application to identify OWASP Top 10 vulnerabilities. Leveraged Burp Suite to scan and exploit vulnerabilities, including SQL Injection and Cross-Site Scripting (XSS), to understand and mitigate security risks.

Outcome: Enhanced security awareness and risk mitigation, protecting the application against common web vulnerabilities.

Security Monitoring and Intrusion Detection System

Technologies Used: Snort IDS, Elastic Defend, OAuth 2.0, Firewalls

Description: Designed a real-time security monitoring system incorporating firewalls, IDS, EDR, and authentication systems. Configured Snort for intrusion detection, implemented firewall rules, and deployed Elastic Defend for endpoint protection.

Features:

  • Custom SIEM dashboards and OAuth 2.0 for secure user authentication.

Outcome: Strengthened security by providing real-time threat detection, response, and monitoring across multiple devices.

Automated CI/CD Pipeline with AWS and Docker

Technologies Used: AWS, Docker, Jenkins, Terraform, Clair, IAM

Description: Developed a CI/CD pipeline for deploying containerized microservices using AWS and Docker. Configured automated infrastructure provisioning using AWS CloudFormation and Lambda, integrating security best practices like IAM role-based access and Docker image scanning.

Outcome: Established a secure, scalable deployment pipeline that streamlined infrastructure management and minimized vulnerabilities in containerized environments.

PrivEdge: Private Training with GAN and Multi-Party Computation

Technologies Used: Python, Keras, TensorFlow, OpenCV, GAN, Secure Multi-Party Computation

Description: Created a privacy-preserving machine learning project using GANs for local image training, leveraging multi-party computation for secure parameter transmission. Designed an encoding-decoding architecture to compare and reconstruct images securely.

Features:

  • Implemented cryptographic techniques to secure model parameter sharing.

Outcome: Demonstrated proficiency in secure machine learning practices, ensuring data privacy in MLaaS (Machine Learning as a Service) operations.

JavaScript Code Security Analyzer

Technologies Used: JavaScript, SAST tools, Agile Methodology

Description: Integrated SAST tools for JavaScript code analysis to detect vulnerabilities such as XSS and CSRF. Developed custom security rules and automated scanning processes, using Agile methodology for iterative development.

Outcome: Enhanced code security and reliability by implementing real-time vulnerability detection and remediation in JavaScript applications.

Fall Detection App

Technologies Used: Java, Android Studio

Description: Developed an Android application that detects falls using accelerometer and gyroscope sensors, alerting emergency contacts via SMS and automated calls upon detecting a fall.

Outcome: Successfully created a functional fall detection app with real-time alert features, enhancing safety for users.

Employee Transaction Tracker GUI Application

Technologies Used: Android Studio, Java Servlets, JDBC, MySQL

Description: Built a GUI application for tracking employee transactions, integrating MySQL with Java Servlets and JDBC for efficient data storage and retrieval.

Outcome: Improved data management processes with a user-friendly interface, enhancing transaction tracking efficiency.


Education

George Mason University

Masters in Information Systems

GPA: 3.7

January 2022 - May 2024

SASTRA deemed University

Bachelor of Technology
Computer Science Engineering

GPA: 3.82

July 2017 - August 2021

Certificates


Skills

Technical Skills

+

Programming Languages: Python, Java, SQL, C, C++, Perl, JS, HTML, CSS

Operating Systems: Linux, Windows, MacOS

Software Development: Git, Agile Development, Docker

Cybersecurity Skills

+

Application Security: OWASP, SQL Injection, Cross-Site Scripting

Threat Detection: SIEM, EDR, Incident Response

Vulnerability Management: Nessus, Qualys, Burp Suite

Tools and Technologies

+

Security Tools: Metasploit, Wireshark, Wazuh

Automation & Scripting: Bash, Perl, PowerShell

Data Analysis: R, Excel


Interests

In my early years, I was all about arts, writing, and poetry, with my nose perpetually in a book. But then I moved to the U.S., where things took a lively turn! Now, I’m a self-proclaimed cultural sponge, always on the hunt for opportunities to meet people from every corner of the world—think campus events, international festivals, or even an accidental chat at the coffee machine. I've made it my mission to learn as much as possible about different cultures, and I like to say I’m collecting life experiences like stamps in a passport.

Outdoors, I’m all about rock climbing, trekking, and hiking, fueled by equal parts enthusiasm and maybe a touch of overconfidence. Escape rooms, though, have become my true calling—something about finding my way out of pretend peril feels oddly comforting! And when I’m not climbing rocks or solving puzzles, you’ll probably find me rolling strikes at the bowling alley or racking up high scores at the arcade.

Of course, I’m also a big fan of cozy TV nights and can’t resist binging on a great show while serving up home-cooked meals for friends (or unwitting taste-testers). I’ve mastered quite a few dishes through YouTube tutorials, especially Indian recipes, because there’s something incredibly satisfying about making a complex dish and nailing it.

When the kitchen isn’t calling, I’m diving into K-dramas and K-pop, or humming along to the latest hits, with the occasional kitchen dance break thrown in. And then there’s my nerdy side—troubleshooting Windows machines, dabbling in Capture the Flag competitions, and basically tinkering with anything tech-related.

So, here I am: a bookworm turned adventurer, with a soft spot for karaoke, escape rooms, and Korean dramas.