{"id":30,"date":"2023-03-10T07:15:20","date_gmt":"2023-03-10T07:15:20","guid":{"rendered":"https:\/\/yashinfosec.com\/?page_id=30"},"modified":"2026-01-22T06:38:03","modified_gmt":"2026-01-22T06:38:03","slug":"portfolio","status":"publish","type":"page","link":"https:\/\/yashinfosec.com\/?page_id=30","title":{"rendered":"Portfolio"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"30\" class=\"elementor elementor-30\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-22d27f93 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"22d27f93\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-56e9b904\" data-id=\"56e9b904\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67df41a2 elementor-widget elementor-widget-text-editor\" data-id=\"67df41a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#About_Me\" >About Me<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Professional_Summary\" >Professional Summary<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Education\" >Education<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Certifications\" >Certifications<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Core_Technical_Skills\" >Core Technical Skills<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Web_API_Penetration_Testing\" >Web &amp; API Penetration Testing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Network_Infrastructure_Security\" >Network &amp; Infrastructure Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Active_Directory_Security\" >Active Directory Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Cloud_Mobile_Security\" >Cloud &amp; Mobile Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Wireless_Endpoint_Adversary_Simulation\" >Wireless, Endpoint &amp; Adversary Simulation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Security_Operations_Detection\" >Security Operations &amp; Detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Professional_Experience\" >Professional Experience<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Independent_Cybersecurity_Consultant\" >Independent Cybersecurity Consultant<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Vulnerability_Assessment_Penetration_Tester\" >Vulnerability Assessment &amp; Penetration Tester<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#SOC_Analyst\" >SOC Analyst<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/yashinfosec.com\/?page_id=30\/#Current_Focus\" >Current Focus<\/a><\/li><\/ul><\/nav><\/div>\n<h5 data-start=\"374\" data-end=\"385\"><span class=\"ez-toc-section\" id=\"About_Me\"><\/span>About Me<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p data-start=\"387\" data-end=\"629\">Hello, I\u2019m <strong data-start=\"398\" data-end=\"431\">Yaswanth Surya Chalamalasetty<\/strong> \u2014 a cybersecurity professional with hands-on experience across <strong data-start=\"495\" data-end=\"628\">Security Operations (SOC), Vulnerability Assessment &amp; Penetration Testing (VAPT), Web &amp; API Security, and Red\/Purple Team support<\/strong>.<\/p>\n<p data-start=\"631\" data-end=\"1071\">I have worked across <strong data-start=\"652\" data-end=\"706\">banking, enterprise IT, and regulated environments<\/strong>, delivering end-to-end security assessments covering <strong data-start=\"760\" data-end=\"885\">web applications, APIs, internal and external infrastructure, Active Directory, cloud environments, and wireless networks<\/strong>. My approach is strongly <strong data-start=\"911\" data-end=\"939\">lab-driven and practical<\/strong>, focused on reproducing real-world attack scenarios and validating security controls rather than relying on theoretical checklists.<\/p>\n<p data-start=\"1073\" data-end=\"1311\">I am currently pursuing a <strong data-start=\"1099\" data-end=\"1164\">Master\u2019s degree in Cyber Security at Coventry University (UK)<\/strong>, while continuing limited advisory and consulting work and actively building <strong data-start=\"1242\" data-end=\"1255\">CortexLab<\/strong>, my personal security research and testing environment.<\/p>\n<hr data-start=\"1313\" data-end=\"1316\" \/>\n<h5 data-start=\"1318\" data-end=\"1341\"><span class=\"ez-toc-section\" id=\"Professional_Summary\"><\/span>Professional Summary<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<ul data-start=\"1343\" data-end=\"1939\">\n<li data-start=\"1343\" data-end=\"1441\">\n<p data-start=\"1345\" data-end=\"1441\">Cybersecurity professional with experience in <strong data-start=\"1391\" data-end=\"1441\">SOC operations, VAPT, and adversary simulation<\/strong><\/p>\n<\/li>\n<li data-start=\"1442\" data-end=\"1535\">\n<p data-start=\"1444\" data-end=\"1535\">Strong expertise in <strong data-start=\"1464\" data-end=\"1508\">web application and API security testing<\/strong>, aligned with OWASP Top 10<\/p>\n<\/li>\n<li data-start=\"1536\" data-end=\"1643\">\n<p data-start=\"1538\" data-end=\"1643\">Hands-on exposure to <strong data-start=\"1559\" data-end=\"1643\">Active Directory attacks, cloud security reviews, and infrastructure assessments<\/strong><\/p>\n<\/li>\n<li data-start=\"1644\" data-end=\"1749\">\n<p data-start=\"1646\" data-end=\"1749\">Experience delivering <strong data-start=\"1668\" data-end=\"1749\">security audits and consulting services for cooperative banks and enterprises<\/strong><\/p>\n<\/li>\n<li data-start=\"1750\" data-end=\"1850\">\n<p data-start=\"1752\" data-end=\"1850\">Proven ability to communicate technical risk clearly through <strong data-start=\"1813\" data-end=\"1850\">executive and technical reporting<\/strong><\/p>\n<\/li>\n<li data-start=\"1851\" data-end=\"1939\">\n<p data-start=\"1853\" data-end=\"1939\">Trainer and speaker with experience delivering <strong data-start=\"1900\" data-end=\"1939\">workshops, FDPs, and guest lectures<\/strong><\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1941\" data-end=\"1944\" \/>\n<h5 data-start=\"1946\" data-end=\"1958\"><span class=\"ez-toc-section\" id=\"Education\"><\/span>Education<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p data-start=\"1960\" data-end=\"2044\"><strong data-start=\"1960\" data-end=\"2005\">Master of Science (MSc) in Cyber Security<\/strong><br data-start=\"2005\" data-end=\"2008\" \/>Coventry University, UK <em data-start=\"2032\" data-end=\"2044\">(Pursuing)<\/em><\/p>\n<p data-start=\"2046\" data-end=\"2125\"><strong data-start=\"2046\" data-end=\"2100\">Bachelor of Technology (B.Tech) \u2013 Computer Science<\/strong><br data-start=\"2100\" data-end=\"2103\" \/>ISBM University, India<\/p>\n<hr data-start=\"2127\" data-end=\"2130\" \/>\n<h5 data-start=\"2132\" data-end=\"2149\"><span class=\"ez-toc-section\" id=\"Certifications\"><\/span>Certifications<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<ul data-start=\"2151\" data-end=\"2419\">\n<li data-start=\"2151\" data-end=\"2198\">\n<p data-start=\"2153\" data-end=\"2198\">Certified Ethical Hacker (CEH) \u2013 EC-Council<\/p>\n<\/li>\n<li data-start=\"2199\" data-end=\"2248\">\n<p data-start=\"2201\" data-end=\"2248\">Certified Network Defender (CND) \u2013 EC-Council<\/p>\n<\/li>\n<li data-start=\"2249\" data-end=\"2297\">\n<p data-start=\"2251\" data-end=\"2297\">EC-Council Certified Security Analyst (ECSA)<\/p>\n<\/li>\n<li data-start=\"2298\" data-end=\"2347\">\n<p data-start=\"2300\" data-end=\"2347\">Computer Hacking Forensic Investigator (CHFI)<\/p>\n<\/li>\n<li data-start=\"2348\" data-end=\"2379\">\n<p data-start=\"2350\" data-end=\"2379\">Certified SOC Analyst (CSA)<\/p>\n<\/li>\n<li data-start=\"2380\" data-end=\"2419\">\n<p data-start=\"2382\" data-end=\"2419\">Certified Secure Computer User (CSCU)<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"2421\" data-end=\"2424\" \/>\n<h5 data-start=\"2426\" data-end=\"2450\"><span class=\"ez-toc-section\" id=\"Core_Technical_Skills\"><\/span>Core Technical Skills<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<h5 data-start=\"2452\" data-end=\"2485\"><span class=\"ez-toc-section\" id=\"Web_API_Penetration_Testing\"><\/span>Web &amp; API Penetration Testing<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<ul data-start=\"2486\" data-end=\"2786\">\n<li data-start=\"2486\" data-end=\"2525\">\n<p data-start=\"2488\" data-end=\"2525\">OWASP Top 10 testing and validation<\/p>\n<\/li>\n<li data-start=\"2526\" data-end=\"2609\">\n<p data-start=\"2528\" data-end=\"2609\">Authentication &amp; authorization testing (IDOR, role abuse, privilege escalation)<\/p>\n<\/li>\n<li data-start=\"2610\" data-end=\"2655\">\n<p data-start=\"2612\" data-end=\"2655\">Session management flaws, JWT\/OAuth abuse<\/p>\n<\/li>\n<li data-start=\"2656\" data-end=\"2703\">\n<p data-start=\"2658\" data-end=\"2703\">Business logic and workflow vulnerabilities<\/p>\n<\/li>\n<li data-start=\"2704\" data-end=\"2744\">\n<p data-start=\"2706\" data-end=\"2744\">API security testing (REST, GraphQL)<\/p>\n<\/li>\n<li data-start=\"2745\" data-end=\"2786\">\n<p data-start=\"2747\" data-end=\"2786\">Manual testing using <strong data-start=\"2768\" data-end=\"2786\">Burp Suite Pro<\/strong><\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"2788\" data-end=\"2791\" \/>\n<h5 data-start=\"2793\" data-end=\"2830\"><span class=\"ez-toc-section\" id=\"Network_Infrastructure_Security\"><\/span>Network &amp; Infrastructure Security<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<ul data-start=\"2831\" data-end=\"3085\">\n<li data-start=\"2831\" data-end=\"2891\">\n<p data-start=\"2833\" data-end=\"2891\">External and internal infrastructure penetration testing<\/p>\n<\/li>\n<li data-start=\"2892\" data-end=\"2942\">\n<p data-start=\"2894\" data-end=\"2942\">Service enumeration and attack surface mapping<\/p>\n<\/li>\n<li data-start=\"2943\" data-end=\"2997\">\n<p data-start=\"2945\" data-end=\"2997\">Network segmentation and firewall security reviews<\/p>\n<\/li>\n<li data-start=\"2998\" data-end=\"3031\">\n<p data-start=\"3000\" data-end=\"3031\">VPN and VLAN security testing<\/p>\n<\/li>\n<li data-start=\"3032\" data-end=\"3085\">\n<p data-start=\"3034\" data-end=\"3085\">Lateral movement analysis and exposure validation<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3087\" data-end=\"3090\" \/>\n<h5 data-start=\"3092\" data-end=\"3121\"><span class=\"ez-toc-section\" id=\"Active_Directory_Security\"><\/span>Active Directory Security<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<ul data-start=\"3122\" data-end=\"3365\">\n<li data-start=\"3122\" data-end=\"3165\">\n<p data-start=\"3124\" data-end=\"3165\">AD enumeration and attack-path analysis<\/p>\n<\/li>\n<li data-start=\"3166\" data-end=\"3203\">\n<p data-start=\"3168\" data-end=\"3203\">Kerberoasting and AS-REP roasting<\/p>\n<\/li>\n<li data-start=\"3204\" data-end=\"3239\">\n<p data-start=\"3206\" data-end=\"3239\">Pass-the-Hash \/ Pass-the-Ticket<\/p>\n<\/li>\n<li data-start=\"3240\" data-end=\"3275\">\n<p data-start=\"3242\" data-end=\"3275\">NTLM relay and delegation abuse<\/p>\n<\/li>\n<li data-start=\"3276\" data-end=\"3322\">\n<p data-start=\"3278\" data-end=\"3322\">Privilege escalation and post-exploitation<\/p>\n<\/li>\n<li data-start=\"3323\" data-end=\"3365\">\n<p data-start=\"3325\" data-end=\"3365\">BloodHound-driven attack path analysis<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3367\" data-end=\"3370\" \/>\n<h5 data-start=\"3372\" data-end=\"3399\"><span class=\"ez-toc-section\" id=\"Cloud_Mobile_Security\"><\/span>Cloud &amp; Mobile Security<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<ul data-start=\"3400\" data-end=\"3678\">\n<li data-start=\"3400\" data-end=\"3455\">\n<p data-start=\"3402\" data-end=\"3455\">AWS security configuration reviews and IAM analysis<\/p>\n<\/li>\n<li data-start=\"3456\" data-end=\"3503\">\n<p data-start=\"3458\" data-end=\"3503\">Cloud misconfiguration and exposure testing<\/p>\n<\/li>\n<li data-start=\"3504\" data-end=\"3573\">\n<p data-start=\"3506\" data-end=\"3573\">Android and iOS application security testing <em data-start=\"3551\" data-end=\"3571\">(assessment level)<\/em><\/p>\n<\/li>\n<li data-start=\"3574\" data-end=\"3622\">\n<p data-start=\"3576\" data-end=\"3622\">Insecure storage and API interaction testing<\/p>\n<\/li>\n<li data-start=\"3623\" data-end=\"3678\">\n<p data-start=\"3625\" data-end=\"3678\">Certificate pinning bypass <em data-start=\"3652\" data-end=\"3676\">(assessment scenarios)<\/em><\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3680\" data-end=\"3683\" \/>\n<h5 data-start=\"3685\" data-end=\"3730\"><span class=\"ez-toc-section\" id=\"Wireless_Endpoint_Adversary_Simulation\"><\/span>Wireless, Endpoint &amp; Adversary Simulation<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<ul data-start=\"3731\" data-end=\"4017\">\n<li data-start=\"3731\" data-end=\"3793\">\n<p data-start=\"3733\" data-end=\"3793\">Wi-Fi penetration testing (WPA2\/WPA3, Evil Twin scenarios)<\/p>\n<\/li>\n<li data-start=\"3794\" data-end=\"3848\">\n<p data-start=\"3796\" data-end=\"3848\">Endpoint exposure and credential capture scenarios<\/p>\n<\/li>\n<li data-start=\"3849\" data-end=\"3891\">\n<p data-start=\"3851\" data-end=\"3891\">Red and Purple Team engagement support<\/p>\n<\/li>\n<li data-start=\"3892\" data-end=\"3921\">\n<p data-start=\"3894\" data-end=\"3921\">Assume-breach assessments<\/p>\n<\/li>\n<li data-start=\"3922\" data-end=\"3969\">\n<p data-start=\"3924\" data-end=\"3969\">Phishing and social engineering simulations<\/p>\n<\/li>\n<li data-start=\"3970\" data-end=\"4017\">\n<p data-start=\"3972\" data-end=\"4017\">Blue team detection and response validation<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"4019\" data-end=\"4022\" \/>\n<h5 data-start=\"4024\" data-end=\"4059\"><span class=\"ez-toc-section\" id=\"Security_Operations_Detection\"><\/span>Security Operations &amp; Detection<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<ul data-start=\"4060\" data-end=\"4322\">\n<li data-start=\"4060\" data-end=\"4118\">\n<p data-start=\"4062\" data-end=\"4118\">SIEM-based alert triage and investigation (<strong data-start=\"4105\" data-end=\"4115\">Splunk<\/strong>)<\/p>\n<\/li>\n<li data-start=\"4119\" data-end=\"4144\">\n<p data-start=\"4121\" data-end=\"4144\">EDR exposure analysis<\/p>\n<\/li>\n<li data-start=\"4145\" data-end=\"4217\">\n<p data-start=\"4147\" data-end=\"4217\">Log analysis across firewalls, WAFs, IDS\/IPS, servers, and endpoints<\/p>\n<\/li>\n<li data-start=\"4218\" data-end=\"4262\">\n<p data-start=\"4220\" data-end=\"4262\">Incident response support and escalation<\/p>\n<\/li>\n<li data-start=\"4263\" data-end=\"4322\">\n<p data-start=\"4265\" data-end=\"4322\">Detection gap identification and tuning recommendations<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"4324\" data-end=\"4327\" \/>\n<h5 data-start=\"4329\" data-end=\"4355\"><span class=\"ez-toc-section\" id=\"Professional_Experience\"><\/span>Professional Experience<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<h5 data-start=\"4357\" data-end=\"4399\"><span class=\"ez-toc-section\" id=\"Independent_Cybersecurity_Consultant\"><\/span>Independent Cybersecurity Consultant<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p data-start=\"4400\" data-end=\"4455\"><strong data-start=\"4400\" data-end=\"4433\">Cybershields and IT Solutions<\/strong> | Jan 2024 \u2013 Aug 2025<\/p>\n<ul data-start=\"4457\" data-end=\"5116\">\n<li data-start=\"4457\" data-end=\"4675\">\n<p data-start=\"4459\" data-end=\"4675\">Led and executed <strong data-start=\"4476\" data-end=\"4516\">VAPT and information security audits<\/strong> for cooperative banks including<br data-start=\"4548\" data-end=\"4551\" \/><em data-start=\"4553\" data-end=\"4675\">Bharatiya Sahakara Niyamitha Bank, Muslim Cooperative Bank, Merchant Cooperative Bank, and Mysore Urban Cooperative Bank<\/em><\/p>\n<\/li>\n<li data-start=\"4676\" data-end=\"4778\">\n<p data-start=\"4678\" data-end=\"4778\">Delivered <strong data-start=\"4688\" data-end=\"4738\">SOC monitoring and security operations support<\/strong> for banking and enterprise environments<\/p>\n<\/li>\n<li data-start=\"4779\" data-end=\"4899\">\n<p data-start=\"4781\" data-end=\"4899\">Conducted enterprise security assessments for organizations such as <strong data-start=\"4849\" data-end=\"4899\">Jaguar Tech Park and Vegolutions India Pvt Ltd<\/strong><\/p>\n<\/li>\n<li data-start=\"4900\" data-end=\"5034\">\n<p data-start=\"4902\" data-end=\"5034\">Delivered <strong data-start=\"4912\" data-end=\"4951\">guest lectures, workshops, and FDPs<\/strong> at institutions including VIT, Christ University, Hindustan University, and others<\/p>\n<\/li>\n<li data-start=\"5035\" data-end=\"5116\">\n<p data-start=\"5037\" data-end=\"5116\">Currently engaged in a limited advisory capacity alongside academic commitments<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"5118\" data-end=\"5121\" \/>\n<h5 data-start=\"5123\" data-end=\"5174\"><span class=\"ez-toc-section\" id=\"Vulnerability_Assessment_Penetration_Tester\"><\/span>Vulnerability Assessment &amp; Penetration Tester<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p data-start=\"5175\" data-end=\"5232\"><strong data-start=\"5175\" data-end=\"5210\">Technomold IT Solutions Pvt Ltd<\/strong> | Mar 2024 \u2013 Jan 2025<\/p>\n<ul data-start=\"5234\" data-end=\"5756\">\n<li data-start=\"5234\" data-end=\"5323\">\n<p data-start=\"5236\" data-end=\"5323\">Conducted VAPT across <strong data-start=\"5258\" data-end=\"5323\">web applications, APIs, internal networks, and infrastructure<\/strong><\/p>\n<\/li>\n<li data-start=\"5324\" data-end=\"5422\">\n<p data-start=\"5326\" data-end=\"5422\">Performed manual and automated testing using <strong data-start=\"5371\" data-end=\"5399\">Burp Suite, Nessus, Nmap<\/strong>, and custom techniques<\/p>\n<\/li>\n<li data-start=\"5423\" data-end=\"5509\">\n<p data-start=\"5425\" data-end=\"5509\">Identified OWASP Top 10 vulnerabilities, misconfigurations, and business logic flaws<\/p>\n<\/li>\n<li data-start=\"5510\" data-end=\"5609\">\n<p data-start=\"5512\" data-end=\"5609\">Delivered detailed <strong data-start=\"5531\" data-end=\"5566\">technical and executive reports<\/strong> with CVSS scoring and remediation guidance<\/p>\n<\/li>\n<li data-start=\"5610\" data-end=\"5685\">\n<p data-start=\"5612\" data-end=\"5685\">Supported compliance-driven assessments aligned with <strong data-start=\"5665\" data-end=\"5685\">PCI-DSS and NIST<\/strong><\/p>\n<\/li>\n<li data-start=\"5686\" data-end=\"5756\">\n<p data-start=\"5688\" data-end=\"5756\">Collaborated with SOC teams to map vulnerabilities to detection gaps<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"5758\" data-end=\"5761\" \/>\n<h5 data-start=\"5763\" data-end=\"5780\"><span class=\"ez-toc-section\" id=\"SOC_Analyst\"><\/span>SOC Analyst<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p data-start=\"5781\" data-end=\"5838\"><strong data-start=\"5781\" data-end=\"5816\">Technomold IT Solutions Pvt Ltd<\/strong> | Mar 2022 \u2013 Mar 2024<\/p>\n<ul data-start=\"5840\" data-end=\"6288\">\n<li data-start=\"5840\" data-end=\"5937\">\n<p data-start=\"5842\" data-end=\"5937\">Monitored and triaged alerts using <strong data-start=\"5877\" data-end=\"5937\">Splunk SIEM, CrowdStrike EDR, and Microsoft 365 Defender<\/strong><\/p>\n<\/li>\n<li data-start=\"5938\" data-end=\"5993\">\n<p data-start=\"5940\" data-end=\"5993\">Investigated phishing attacks and email-borne threats<\/p>\n<\/li>\n<li data-start=\"5994\" data-end=\"6078\">\n<p data-start=\"5996\" data-end=\"6078\">Analyzed logs from firewalls, WAFs, IDS\/IPS, web servers, databases, and endpoints<\/p>\n<\/li>\n<li data-start=\"6079\" data-end=\"6163\">\n<p data-start=\"6081\" data-end=\"6163\">Supported incident response, containment coordination, and post-incident reporting<\/p>\n<\/li>\n<li data-start=\"6164\" data-end=\"6238\">\n<p data-start=\"6166\" data-end=\"6238\">Conducted basic malware analysis using <strong data-start=\"6205\" data-end=\"6238\">Cuckoo Sandbox and VirusTotal<\/strong><\/p>\n<\/li>\n<li data-start=\"6239\" data-end=\"6288\">\n<p data-start=\"6241\" data-end=\"6288\">Assisted with SIEM tuning and SOC documentation<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"6290\" data-end=\"6293\" \/>\n<h5 data-start=\"6295\" data-end=\"6311\"><span class=\"ez-toc-section\" id=\"Current_Focus\"><\/span>Current Focus<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<ul data-start=\"6313\" data-end=\"6559\">\n<li data-start=\"6313\" data-end=\"6360\">\n<p data-start=\"6315\" data-end=\"6360\">Advanced <strong data-start=\"6324\" data-end=\"6360\">Web Application &amp; API Pentesting<\/strong><\/p>\n<\/li>\n<li data-start=\"6361\" data-end=\"6420\">\n<p data-start=\"6363\" data-end=\"6420\">Authentication, authorization, and access control testing<\/p>\n<\/li>\n<li data-start=\"6421\" data-end=\"6466\">\n<p data-start=\"6423\" data-end=\"6466\">Mapping vulnerabilities to <strong data-start=\"6450\" data-end=\"6466\">OWASP Top 10<\/strong><\/p>\n<\/li>\n<li data-start=\"6467\" data-end=\"6498\">\n<p data-start=\"6469\" data-end=\"6498\">SOC + AppSec crossover skills<\/p>\n<\/li>\n<li data-start=\"6499\" data-end=\"6559\">\n<p data-start=\"6501\" data-end=\"6559\">Publishing technical blogs and building lab-based research<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1890064 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"1890064\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27fc146\" data-id=\"27fc146\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7222ffd elementor-widget elementor-widget-image\" data-id=\"7222ffd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img data-opt-id=219476213  fetchpriority=\"high\" decoding=\"async\" width=\"401\" height=\"93\" src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:401\/h:93\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png\" class=\"attachment-large size-large wp-image-60\" alt=\"\" srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:401\/h:93\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png 401w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:70\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png 300w\" sizes=\"(max-width: 401px) 100vw, 401px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>About Me Hello, I\u2019m Yaswanth Surya Chalamalasetty \u2014 a cybersecurity professional with hands-on experience across Security Operations (SOC), Vulnerability Assessment &amp; Penetration<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"iawp_total_views":58,"footnotes":""},"class_list":{"0":"post-30","1":"page","2":"type-page","3":"status-publish","5":"col-md-12"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Portfolio - yashinfosec.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yashinfosec.com\/?page_id=30\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Portfolio - yashinfosec.com\" \/>\n<meta property=\"og:description\" content=\"About Me Hello, I\u2019m Yaswanth Surya Chalamalasetty \u2014 a cybersecurity professional with hands-on experience across Security Operations (SOC), Vulnerability Assessment &amp; Penetration\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yashinfosec.com\/?page_id=30\" \/>\n<meta property=\"og:site_name\" content=\"yashinfosec.com\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T06:38:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png\" \/>\n\t<meta property=\"og:image:width\" content=\"401\" \/>\n\t<meta property=\"og:image:height\" content=\"93\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/yashinfosec.com\/?page_id=30\",\"url\":\"https:\/\/yashinfosec.com\/?page_id=30\",\"name\":\"Portfolio - yashinfosec.com\",\"isPartOf\":{\"@id\":\"https:\/\/yashinfosec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/yashinfosec.com\/?page_id=30#primaryimage\"},\"image\":{\"@id\":\"https:\/\/yashinfosec.com\/?page_id=30#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png\",\"datePublished\":\"2023-03-10T07:15:20+00:00\",\"dateModified\":\"2026-01-22T06:38:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/yashinfosec.com\/?page_id=30#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/yashinfosec.com\/?page_id=30\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/yashinfosec.com\/?page_id=30#primaryimage\",\"url\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png\",\"contentUrl\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png\",\"width\":401,\"height\":93},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/yashinfosec.com\/?page_id=30#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/yashinfosec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portfolio\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/yashinfosec.com\/#website\",\"url\":\"https:\/\/yashinfosec.com\/\",\"name\":\"yashinfosec.com\",\"description\":\"Explore Security In-depth\",\"publisher\":{\"@id\":\"https:\/\/yashinfosec.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/yashinfosec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/yashinfosec.com\/#organization\",\"name\":\"yashinfosec.com\",\"url\":\"https:\/\/yashinfosec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png\",\"contentUrl\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png\",\"width\":250,\"height\":250,\"caption\":\"yashinfosec.com\"},\"image\":{\"@id\":\"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Portfolio - yashinfosec.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yashinfosec.com\/?page_id=30","og_locale":"en_US","og_type":"article","og_title":"Portfolio - yashinfosec.com","og_description":"About Me Hello, I\u2019m Yaswanth Surya Chalamalasetty \u2014 a cybersecurity professional with hands-on experience across Security Operations (SOC), Vulnerability Assessment &amp; Penetration","og_url":"https:\/\/yashinfosec.com\/?page_id=30","og_site_name":"yashinfosec.com","article_modified_time":"2026-01-22T06:38:03+00:00","og_image":[{"width":401,"height":93,"url":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/yashinfosec.com\/?page_id=30","url":"https:\/\/yashinfosec.com\/?page_id=30","name":"Portfolio - yashinfosec.com","isPartOf":{"@id":"https:\/\/yashinfosec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/yashinfosec.com\/?page_id=30#primaryimage"},"image":{"@id":"https:\/\/yashinfosec.com\/?page_id=30#primaryimage"},"thumbnailUrl":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png","datePublished":"2023-03-10T07:15:20+00:00","dateModified":"2026-01-22T06:38:03+00:00","breadcrumb":{"@id":"https:\/\/yashinfosec.com\/?page_id=30#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yashinfosec.com\/?page_id=30"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yashinfosec.com\/?page_id=30#primaryimage","url":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png","contentUrl":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/all-badges.png","width":401,"height":93},{"@type":"BreadcrumbList","@id":"https:\/\/yashinfosec.com\/?page_id=30#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yashinfosec.com\/"},{"@type":"ListItem","position":2,"name":"Portfolio"}]},{"@type":"WebSite","@id":"https:\/\/yashinfosec.com\/#website","url":"https:\/\/yashinfosec.com\/","name":"yashinfosec.com","description":"Explore Security In-depth","publisher":{"@id":"https:\/\/yashinfosec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yashinfosec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/yashinfosec.com\/#organization","name":"yashinfosec.com","url":"https:\/\/yashinfosec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/","url":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png","contentUrl":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png","width":250,"height":250,"caption":"yashinfosec.com"},"image":{"@id":"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/pages\/30","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=30"}],"version-history":[{"count":25,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/pages\/30\/revisions"}],"predecessor-version":[{"id":639,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/pages\/30\/revisions\/639"}],"wp:attachment":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=30"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}