Jaswanth K L

Jaswanth k l

bookmark on deepenrich
location of Jaswanth K LAustin, Texas Metropolitan Area
Followers of Jaswanth K L613 followers
  • Timeline

  • About me

    Cyber Security Engineer at NBC Universal | Certified Ethical Hacker | AWS Security Specialty | Microsoft Certified Security Operations Associate |Microsoft Certified Cybersecurity Architect |TryHackMe Top 1% |

  • Education

    • Sacred heart university

      2022 - 2023
      Masters in cybersecurity 3.67
  • Experience

    • Bugcrowd

      Feb 2018 - now
      Bug bounty

      - Actively participated in Bugcrowd bounty programs, identifying and reporting critical vulnerabilities across web applications, APIs, and network infrastructures. - Discovered and responsibly disclosed security flaws such as XSS, SQL injection, authentication bypass, and IDOR vulnerabilities. - Enhanced expertise in vulnerability assessment and exploit development through hands-on engagement with live targets and private programs. - Collaborated with security teams to provide detailed reports, leading to successful mitigation of high-impact vulnerabilities. Show less

    • Smartbridge

      Mar 2019 - May 2019
      Machine learning intern

      - Developed and optimized machine learning models to detect anomalous network behavior, improving the accuracy of threat detection and reducing false positives. - Applied supervised and unsupervised learning techniques to identify malware patterns, phishing URLs, and intrusion attempts in real-time datasets. - Built and fine-tuned classification models using Python libraries like Scikit-learn, TensorFlow, and PyTorch to identify cyber threats. - Preprocessed large-scale log data from SIEM platforms (e.g., Splunk, ELK) to train and evaluate models for threat intelligence. - Implemented anomaly detection algorithms (e.g., Isolation Forest, Autoencoders) to identify insider threats and zero-day attacks. - Conducted feature engineering on network traffic and endpoint data, improving model performance and interpretability. - Automated threat detection pipelines by integrating ML models with existing cybersecurity frameworks for real-time monitoring. - Analyzed cyberattack patterns to enhance the performance of predictive models for phishing detection and malware classification. - Collaborated with security engineers to operationalize ML models, ensuring seamless deployment in threat intelligence platforms. - Documented and presented findings, including model accuracy, false-positive rates, and potential improvements to key stakeholders. Show less

    • Tryhackme

      Mar 2019 - now
      Capture the flag (ctf player)

      - Achieved a Top 1% rank (#4,990) globally on TryHackMe, demonstrating advanced skills in web application security, network exploitation, and privilege escalation. - Earned 16 badges by completing 111 hands-on labs, covering areas like offensive security, reverse engineering, and cloud exploitation. - Consistently solved real-world cybersecurity challenges, enhancing expertise in penetration testing methodologies and incident analysis.

    • Indian servers - software development company

      Jun 2019 - Jan 2020
      Web application pentesting intern

      ✅ Core Responsibilities & Achievements- Conducted manual and automated penetration testing on web applications to identify vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), and Security Misconfigurations. - Leveraged tools like Burp Suite, OWASP ZAP, and SQLmap to perform in-depth assessments and verify security flaws. - Performed reconnaissance and enumeration using Nmap, Dirbuster, and WhatWeb to gather information on application environments. - Analyzed HTTP request/response cycles to identify insecure direct object references (IDOR) and broken authentication issues. - Documented and delivered detailed vulnerability reports with reproducible steps, potential impact, and actionable remediation recommendations. - Conducted API penetration testing, focusing on REST and SOAP APIs, to identify weaknesses like improper input validation and exposed sensitive data. - Collaborated with development teams to provide remediation guidance and ensure the implementation of secure coding practices . - Participated in capture-the-flag (CTF) challenges and internal security drills to improve detection and exploitation skills. - Assisted in threat modeling and risk assessment by identifying critical attack surfaces and potential business impact. Show less

    • Kewlett digi labs

      Mar 2020 - Jul 2022
      Cyber security engineer

      Responded to critical security incidents within the Kewlett Security Operations Center.Conducted security investigations with the help of native and OSINT tools.Involved in Network vulnerability assessments, analysis, monitoring and reporting, and audits of network infrastructure.Experience in security reviews to ensure compliance with internal security standards and regulatory requirements.Troubleshoot TCP/IP problems and troubleshoot connectivity issues in multi-protocol Ethernet and Environment.Investigated network traffic accumulated from IDS/IPS and used event correlation to assess and mitigate risks.Used Network scanning using tools like Nmap, and Nessus as part of the penetration testing and forensic investigation.Proactively monitoring Splunk dashboards and Crowd Strike overwatch incidents for any irregularities and abnormalspikes.Recommended changes to improve the security posture and improve the tools to reduce the attack surface.Involved engineering and vulnerability management teams to discuss the latest trends and changes within the security space.Maintained SOP’s and other documentation related to alerts up to date.Created tuning requests for support teams and improved efficiency.Generated metrics, and dashboards to present them to Stakeholders and executives.Participated in purple teaming exercises and CTFs to improve the knowledge and tactics. Show less

    • Hackthebox kerala

      Jun 2020 - now
      Capture the flag (ctf player)

      - Achieved Hacker rank on Hack The Box, demonstrating advanced skills in penetration testing, vulnerability exploitation, and post-exploitation techniques. - Completed 45+ machines, specializing in areas like Active Directory, privilege escalation, and web application security. - Applied real-world offensive security methodologies, improving expertise in network intrusion, reverse engineering, and lateral movement.

    • Nbcuniversal

      Aug 2023 - now
      Cyber security engineer

      Performing real-time proactive security monitoring and reporting on various security enforcement systems, such as MacAfee Nitro ,Qradar,Splunk (SIEM), Anti-Virus, internet content filtering/ reporting, malware code prevention, Firewalls, IDS&IPS, web security, Anti-spam, etc.Containing and mitigating incidents involving critical and other support systems.Proficiency in network traffic captures and network mapping tools like Wireshark.Conduct computer and network forensic technical investigations including performing network packet analysis.Assist Network Operations with developing secure system baseline Configurations.Support the Information Security Architect in the design and management of a secure network infrastructureWe are identifying and remediating any threats and vulnerabilities as a security monitoring (SOC), Triage, and escalation to T2.Performed vulnerability scanning on networks and made sure that vulnerabilities were addressed.Managing security tools DLP, SIEM, Vulnerability scanning, and pen testing.Reviewing alerts including Phishing, DLP, Crowd Strike, and Splunk.Performing automated and manual security assessments to identify configuration and patch-related issues.Providing leadership in designing and implementing security solutions towards Qualys and SIEM tool, solution, and Log Rhythm. Show less

  • Licenses & Certifications

    • Comptia cybersecurity analyst (cysa+)

      Comptia
      Oct 2025
    • Microsoft certified: cybersecurity architect expert certification

      Microsoft
    • Splunk core certified power user

      Splunk
      Jul 2025
    • Certified ethical hacker (ceh) -practical

      Ec-council
      Dec 2022
    • Microsoft virtual internship

      Microsoft
      Jul 2020
    • Microsoft certified: security operations analyst associate

      Microsoft
    • Ai for cybersecurity

      Isc2
      Aug 2025
    • Aws certified security -speciality

      Amazon
      Feb 2024
      View certificate certificate
    • Sainya ranakshetram( indian army)

      Indian army
      Feb 2022
  • Volunteer Experience

    • Campus Ambassador

      Issued by E-Cell, IIT Bombay on Jul 2021
      E-Cell, IIT BombayAssociated with Jaswanth K L
    • Defense Analyst

      Issued by Indian Cyber Troops (ICT) on Aug 2018
      Indian Cyber Troops (ICT)Associated with Jaswanth K L