Hello, I am

Dhayanithi Ramaraj

Result-driven IT security professional understanding of security protocols, risk management, and threat mitigation. Experienced in safeguarding systems, networks, and data against security breaches through preventive and reactive measures, implementing robust security solutions, conducting vulnerability assessments, and responding to incidents swiftly to minimize impact. Skillset in developing strong analytical mindset and behavioural analytics for identification, remediation, containment, and eradication of threats targeting users and company infrastructure...

Download CV

Cyber Security

Data Analyst

Web Developement

Security Trainee

About Me

Greetings! I'm Dhayanithi Ramaraj, a passionate Cyber Security Professional and SOC Member specializing in proactive defense strategies and threat mitigation.
Hello! I'm Dhayanithi Ramaraj, a dedicated Cyber Security Professional and SOC Member passionate about turning cyber threats into robust defense strategies. With a knack for proactive security and threat mitigation, I specialize in network security, ethical hacking, and vulnerability management. Armed with extensive hands-on experience, I leverage powerful tools like Kali Linux, Nmap, and Metasploit to secure systems, networks, and data. My programming skills in SQL, Python, Java, and PowerShell enable me to craft tailored security solutions that stand resilient against evolving threats. I’ve completed over 15 comprehensive modules on Operating Systems, Networking Fundamentals, Web Application Hacking, and Ethical Hacking Techniques. My expertise includes configuring IDS/IPS systems, implementing SIEM solutions, and transforming data insights into actionable strategies using Tableau and Power BI. What sets me apart is my ability to translate complex cybersecurity insights into intuitive, impactful dashboards that empower stakeholders. Driven by a passion for staying ahead of industry trends, I’m eager to contribute to innovative, security-focused organizations. Ready to fortify your digital fortress? Let's connect and take your cybersecurity to the next level.

Read More

Work Experience

Cybersecurity and Ethical Hacking Internship

Company: Edureka

Duration: Jan. 2024 - Present

  • Core Cybersecurity Skills Development:
    • Progressed through 15+ comprehensive modules covering Domain Management, SSL Certificates, and Security, Vulnerability Management, Linux and Windows Server Operating Systems, and Ethical Hacking Techniques.
  • Tools and Frameworks Proficiency:
    • Engaged with 10+ industry-standard tools such as Kali Linux, Burp Suite, OWASP, CSPM tools, and Recon-ng to simulate real-world cyber-attacks and defenses. Proficient in investigating/troubleshooting IT Server Infrastructure related incidents.
    • Demonstrated proficiency in implementing key frameworks: Mitre Att&CK, NIST, and ITIL processes for threat analysis and detection.
  • Hands-On Project Experience:
    • Crafted an industry-grade project involving penetration testing on an E-Commerce website, utilizing Kali Linux, Burp Suite, and Recon-ng to discover 5 hidden flags and 10 vulnerabilities.
  • Cloud Security:
    • Developed understanding and skills in Microsoft Azure Cloud Hosting, including best practices for securing cloud environments. Familiarized with the security features of 3 major cloud service providers and Web Application Firewalls.
  • Digital Forensics and Future Certifications:
    • Developed skills in digital forensics, contributing to a well-rounded understanding of cybersecurity, and certified in Cybersecurity and Ethical Hacking. Knowledgeable in LAMP based applications and Software Development / Deployment pipelines.

Data Analyst Intern

Company: Capgemini

Duration: Feb. 2022 – Apr. 2022

  • Project Contributions:
    • Contributed to 5+ data visualization projects and conducted exploratory data analysis on datasets exceeding 1 million records. Collaborated with 4+ cross-functional teams to define project scopes and deliver actionable insights.
  • Data Manipulation and Analysis:
    • Utilized Python, R, and SQL to manipulate and analyze data, achieving a 20% improvement in processing efficiency & extracting meaningful insights and trends from large datasets, enhancing data-driven decision-making processes and problem solving.
  • Dashboard and Report Creation:
    • Created 10+ visually compelling dashboards and reports using Tableau and Power BI for stakeholders.

Tools & Frameworks

Languages:

  • SQL
  • Python
  • Java
  • Go
  • PowerShell

Databases:

  • MySQL
  • Oracle DB

Web Development:

  • HTML
  • CSS
  • JavaScript

Software Tools:

  • VS Code
  • GitHub
  • MongoDB
  • Microsoft Azure
  • AWS
  • Maltgeo

Data Analysis & Visualization:

  • Python
  • Tableau
  • Microsoft Excel
  • PowerBI

Cybersecurity Tools:

  • Kali Linux
  • Nmap
  • Nikto
  • Splunk
  • BEEF
  • Metasploit
  • Wireshark
  • OWASP
  • OSNIT
  • SIEM Tools
  • Storm Breaker
  • Playbooks

Key Frameworks:

  • Mitre Att&CK
  • NIST
  • ISO27001
  • CIS
  • General Data Protection Regulation (GDPR)

Certifications

AWS Cloud Practitioner Essentials

Issued by: Amazon Web Services (AWS)

Date Issued: February 2024

Google Cybersecurity Certificate

Issued by: Google

Date Issued:04 Apirl 2024

Alison Penetration Testing Engineer Certificate

Issued by: Alison

Date Issued: 30 Apirl 2024

Pirple Cyber Security: White-Hat Ethical-Hacking Certificate

Issued by: Pirple

Date Issued:20 May 2024

Edureka Cybersecurity and Ethical-Hacking Internship

Issued by: Edureka

Date Issued:10 June 2024

Volunteer : Gambling Awareness Group

Issued by: Sheffield Minds & Univeristy of Sheffield

Date Issued: 10 May 2024

Cyber Security Services

Secure User Access Management

Implement secure user access management in Linux environments to protect against unauthorized access and ensure data confidentiality. Highlighting expertise in security protocols and risk management, ensuring robust protection.

Read More

Web Application Vulnerability Analysis

Thorough analysis of web application source code vulnerabilities using tools like Nmap, Wireshark, and Metasploit to identify and mitigate security risks. SEO benefits include optimized web application security strategies.

Read More

Network Traffic Analysis and Website Information Gathering

Analyze network traffic using tools like Wireshark and Netcraft to detect and mitigate potential threats, while also utilizing Linux-based tools such as Nmap and Maltego for comprehensive information gathering on websites, identifying potential vulnerabilities and risks. Clients and employers benefit from detailed threat analysis and proactive security measures.

Read More

Data Analysis and Visualization

Utilize powerful tools like Python and Tableau for in-depth data analysis and visualization, extracting actionable insights for informed decision-making. Call to action includes leveraging data-driven insights for strategic cyber security improvements.

Read More

Database Management and Security

Proficient in SQL queries and database management, ensuring efficient data organization, retrieval, and manipulation for data-driven decision-making. Conduct assessments of database security configurations and access controls, ensuring data integrity and confidentiality.

Read More

Custom Cybersecurity Solutions

Develop tailored cybersecurity solutions aligned with your organization's unique needs. From secure coding practices to threat modeling and penetration testing, ensure your digital assets remain resilient against cyber threats.

Read More

Highlighted Projects

BERT NLP Project

BERT NLP Project

Implemented BERT (Bidirectional Encoder Representations from Transformers) to analyze global gaming trends and extract insights from top comments on Reddit. Utilized Python for data scraping, NLP preprocessing, and visualization using Matplotlib.

Keylogger Backdoor Project

Keylogger Backdoor Project

Implemented a Python-based keylogger with a backdoor using Netcat and Metasploit, capturing keystrokes and maintaining remote access for security testing purposes.

Game Classification and Rating Filter

SQL project analyzes a fictional dataset of games, focusing on various aspects such as top games by ratings, average scores, genres analysis

E-Commerce Penetration Testing

E-Commerce Penetration Testing

Conducted penetration testing on an E-Commerce website using Kali Linux, Burp Suite, and Recon-ng, identifying 5 hidden flags and 10 vulnerabilities.

Linux User Adminsitration Project

Linux User Adminsitration Project

Learn how to secure file access on Linux with user accounts, FACLs, and permissions management in this detailed guide

Website Information Gathering

Website Information Gathering

Utilized Nmap, Nikto, and Recon-ng for website reconnaissance and information gathering, identifying vulnerabilities and providing security improvement recommendations.

Malware Creation Project

Malware Creation Project

Developed malware using FatRat, Metasploitable, and Veil, implementing techniques to bypass antivirus detection and experimenting with phishing, USB drops, and network attacks.

Network Project Execution and Troubleshooting

Executed Cisco Packet Tracer projects, managing packet transmission, data authentication, and server node troubleshooting TCP/IP framework.

Housing Prices Crisis Data Analytics

Housing Prices Crisis Data Analytics

Conducted in-depth data analysis on housing prices during a crisis period using Python, SQL, and Tableau. Extracted insights to understand market trends, predict fluctuations, and inform strategic decisions.

Valuable Testimonial

Rohit Narayanan

Working with Dhayanithi has been an absolute pleasure. His expertise in cybersecurity is truly impressive. He approaches challenges with a meticulous attention to detail and consistently delivers innovative solutions. Dhayanithi's dedication and proactive mindset make him an invaluable asset to any team.

Akhash

Dhayanithi is an exceptional cybersecurity professional. His deep understanding of security protocols and proactive approach to threat mitigation have significantly strengthened our digital defenses. His ability to translate complex technical issues into clear, actionable strategies is commendable. Dhayanithi's dedication to staying ahead of emerging threats makes him a trusted advisor in our cybersecurity efforts..

Vishnu Prasadh

""Dhayanithi's leadership and team skills are exceptional. He consistently demonstrates a strong ability to lead cross-functional teams towards achieving cybersecurity goals. His collaborative approach fosters a productive environment where team members are motivated to innovate and excel. Dhayanithi's leadership has been instrumental in implementing robust security measures and ensuring cohesive teamwork in our organization.""

Contact Me!