Sai Koushik Reddy Mavillapally
Skills
Threat Hunting, Incident Response, Cyber Threat Intelligence (CTI), SIEM (Splunk, ELK, Wazuh, Security Onion), Endpoint Detection & Response (EDR) (CrowdStrike, SentinelOne, Velociraptor), OSINT (Shodan, Maltego, VirusTotal, OpenCTI, TheHive, MISP), Intrusion Detection & Prevention Systems (Suricata, Zeek), Digital Forensics (Autopsy, Volatility, Wireshark), Malware Analysis, YARA Rules Development, Active Directory Security, Security Automation (Python, PowerShell, Bash), Vulnerability Management (Qualys VMDR, Nessus, OpenVAS), Compliance & Risk Management (ISO 27001, CIS Benchmarks), Security Operations, IAM Security, Log Analysis, Network Security Monitoring, Adversary Tracking, Security Hardening, Incident Investigation, Security Policy Enforcement, SOC Operations, Threat Actor Profiling, Privilege Escalation Detection, Security Scripting, Reverse Engineering Basics, Packet Analysis, Security Awareness & Training
About
🔹 Cybersecurity Professional | Threat Hunting | Incident Response | Blue Team | SIEM | OSINT | EDR 🔹
With 7+ years of combined IT and cybersecurity experience, I specialize in threat hunting, security monitoring, incident response, and cyber threat intelligence (CTI). My background includes 3+ years of hands-on security-focused roles in IT operations, security automation, and infrastructure defense, along with 4 years of specialized cybersecurity education.
I have worked with Splunk, ELK, Wazuh, Security Onion, Suricata, CrowdStrike, SentinelOne, and Velociraptor, leveraging these tools to detect and respond to threats in real-world environments. My expertise extends to vulnerability management, forensic analysis, and OSINT research, allowing me to track adversary tactics and improve enterprise security postures.
Certifications & Technical Skills:
✅ CompTIA CySA+ | Security+ | Qualys VMDR | ISO 27001
✅ SIEM & Threat Hunting – Splunk, ELK, Wazuh, Security Onion
✅ Endpoint Detection & Response (EDR) – CrowdStrike, SentinelOne, Velociraptor
✅ Cyber Threat Intelligence (CTI) – MITRE ATT&CK, OSINT, YARA Rules, OpenCTI, TheHive
✅ Forensics & Malware Analysis – Autopsy, Volatility, Wireshark
✅ Scripting & Security Automation – Python, PowerShell, Bash
Professional Experience & Key Contributions:
🚀 Threat Hunting & Security Monitoring – Developed SIEM correlation rules and optimized detection strategies to identify sophisticated attacks.
🔍 OSINT Research & Incident Analysis – Conducted real-world investigations, tracking threat actors and mapping tactics to MITRE ATT&CK.
🔒 Vulnerability Research & Remediation – Identified misconfigurations and security flaws, improving system resilience.
⚡ Forensic Investigations – Analyzed digital evidence and performed malware analysis to extract IoCs and assist incident response teams.
🛠 Security Automation & IAM – Created PowerShell & Python scripts to streamline security workflows and improve Active Directory security.
I am passionate about continuous learning and hands-on research, regularly sharpening my skills through practical projects, labs, and security challenges. I actively engage with cybersecurity communities, CTFs, and knowledge-sharing platforms to stay ahead of emerging threats.
Let's connect to discuss cybersecurity trends, threat intelligence, and new opportunities in SOC, Blue Team, and Threat Hunting roles! 🚀