Cybersecurity Student | Aspiring Security Analyst
I specialize in analyzing system and application vulnerabilities through structured security labs and controlled testing environments. My focus is on understanding attack methodologies, identifying security weaknesses, and applying mitigation strategies aligned with industry security practices.
My learning approach emphasizes hands-on security engineering over theory, with continuous exposure to offensive techniques and defensive countermeasures.
- Web Application Security (OWASP Top 10 exploitation & mitigation)
- Vulnerability Assessment & Risk Analysis
- Network Reconnaissance & Attack Surface Mapping
- Linux System Security & Infrastructure Hardening
- SOC Operations & Security Monitoring Fundamentals
Security Tooling
- Nessus → Vulnerability scanning, risk prioritization, reporting
- Nmap → Network discovery, service enumeration, exposure mapping
- WebGoat → Application security testing and exploitation practice
- Kali Linux → Offensive security and lab-based testing environment
Core Security Knowledge
- Web exploitation techniques (SQL Injection, XSS, CSRF)
- Vulnerability classification using CVSS concepts
- DNS enumeration and network footprinting
- Linux service configuration and security hardening
- Basic log interpretation and incident detection concepts
Designed and secured a WordPress-based e-commerce system with focus on authentication controls, SSL encryption, firewall configuration, and system-level hardening. The objective was to reduce common web attack vectors and enforce secure deployment practices.
Performed structured security testing on intentionally vulnerable applications to study exploitation behavior across OWASP vulnerabilities. Focus areas included SQL Injection, Cross-Site Scripting, and CSRF, with emphasis on root-cause analysis and mitigation mapping.
Executed vulnerability scans on system and network environments using Nessus. Identified security weaknesses, classified risk levels based on severity, and documented remediation strategies aligned with security best practices and CVSS interpretation.
Configured and secured a full LAMP stack environment (Apache, MySQL, PHP) on Linux. Implemented baseline security controls including SSL deployment, service restriction, permission hardening, and exposure minimization.
Conducted structured reconnaissance using Nmap and DNS enumeration techniques to identify open ports, active services, and potential attack surfaces. Focused on understanding early-stage attacker methodology and system visibility in networks.
Currently focused on transitioning into a Security Analyst (SOC) role, with specialization in vulnerability management, security monitoring, and incident analysis.
Actively strengthening practical cybersecurity capabilities through continuous lab work in both offensive and defensive domains, with emphasis on real-world attack understanding and defensive response strategies.
GitHub: denish-adhikari