Skip to content
View Batina-Jennifer's full-sized avatar
๐ŸŽฏ
Focusing
๐ŸŽฏ
Focusing

Block or report Batina-Jennifer

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please donโ€™t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
Batina-Jennifer/README.md

Hey there๐Ÿ‘‹

I'm Jenny, a Computer Science Engineer with a strong foundation in cybersecurity and 18 months of hands-on experience as a SOC Analyst, passionate about building resilient and automated security solutions.

About Me

๐ŸŽ“ Computer Science Engineer with a Distinction in my Bachelorโ€™s degree
๐Ÿ’– GEST (Girl Education Scholarship Test) awardee during high school (11thโ€“12th)
๐Ÿ“œ Certified with a Diploma in Cyber Laws, strengthening my security foundation
๐Ÿข Ex-UST employee, where I worked as a SOC Analyst
๐Ÿ›ก๏ธ Bringing 18 months of hands-on experience in Security Operations & threat monitoring
๐Ÿš€ Currently pursuing growth as a SIEM / Security Engineer, building projects that automate and scale security operations in the IT industry.

Hobbies & Goals

๐Ÿ… Passionate long-distance runner with a love for endurance challenges.
๐Ÿš€ CompTIA Security+ exam to be cleared by the end of April 2026.
๐ŸŽŒ Love Anime - Naruto, One Piece, and Demon Slayer are my absolute favorites.

Languages & Skills

๐Ÿ—ฃ๏ธ Human Languages: English, Hindi, German, Telugu, Malayalam
๐Ÿ’ป Programming & Tech: Python, Powershell, Linux, SQL, Gcloud, Splunk, HTML, JavaScript, Terraform (IaC)

Pinned Loading

  1. wannacry-attack-simulation wannacry-attack-simulation Public

    I simulated a WannaCry Ransomware attack using 2 VMs by exploiting the SMB vulnerability on Windows 7 machines.

  2. windows-vulnerability-hardening windows-vulnerability-hardening Public

    I broke into and fixed the Windows 7 SMB vulnerability by hardening the system.

  3. deception-tech-honeypots deception-tech-honeypots Public

    I utilized honeypots, the most popular forms of deception technology, to understand attacker recon behavior patterns using T-Pot.

  4. automated-pii-anonymization automated-pii-anonymization Public

    A Python-based security automation script designed to protect user privacy by anonymizing sensitive data in CSV files.

    Python

  5. Batina-Jennifer Batina-Jennifer Public

    Hi, I'm Jennifer. Learn more about me here.