$ whoami

Varsha D

Cybersecurity Analyst

New Jersey, NJ ยท varsha13sfd@gmail.com

ยท ยท

Cybersecurity analyst with experience in SOC operations, incident response, vulnerability management, and SIEM/SOAR automation in large-scale enterprise environments. Strong background in security compliance, secure SDLC, and cross-functional threat response.

// Skills โ€” Interactive Map

Hover a core skill to spotlight related tools. Tap to pin a skill on mobile.

Tools & Libraries

All tools visible. Hover/tap a core skill to highlight related tooling.
Python
automation โ€ข scripting
PowerShell
windows tooling
SQL
Postgres โ€ข Oracle
TypeScript
apps โ€ข APIs
Java
services โ€ข tooling
Node.js
services
PHP
server-side
AWS
EC2 โ€ข RDS โ€ข S3
GCP
compute โ€ข storage
Azure
cloud security
Docker
containers
Kubernetes
orchestration
Jenkins
pipelines
CI/CD
automation
NIST RMF
800-37
NIST 800-53
controls
NIST 800-171
CUI protection
FedRAMP
compliance
POA&M
risk tracking
RSA Archer
GRC platform
Splunk SIEM
correlation
Elastic Stack
search โ€ข logs
Palo Alto SOAR
playbooks
Tenable SC
vuln mgmt
CrowdStrike
EDR
Axonius
asset inventory
Nessus
scanning
Nmap
discovery
Metasploit
testing
Burp Suite
web testing
Linux
servers โ€ข ops
TCP/IP
networking
DNS
resolution
VPN
secure tunnels
Pandas
dataframes
NumPy
arrays
scikit-learn
models โ€ข metrics
TensorFlow
training โ€ข serving
PyTorch
models โ€ข research

// Professional Experience

Federal Aviation Administration
Security Analyst - Technical Writer
Oct 2024 - Present | New Jersey, NJ
  • Working in the Cybersecurity risk and compliance team โ€” responsible for evaluating systems against NIST 800-53 controls and FedRAMP controls, identifying gaps in reliability, availability, and security requirements while developing practical knowledge of CIA risk scoring and compliance frameworks.
  • Investigated security alerts and log activity using Splunk dashboards and Microsoft Defender for Endpoint (MDE) to identify anomalous behavior patterns and verify potential incidents.
  • Collaborated closely with security and engineering stakeholders to evaluate risk scenarios using threat-modeling concepts and prepared clear risk summaries and compliance status reports, improving visibility into security posture and informing follow-up actions.
POA&M Vulnerability Mgmt SIEM/EDR
SDH Systems
Software Developer (Security)
Dec 2022 - Sep 2024 | New York, NY
  • Worked as a backend engineer designing and improving API and service logic, supporting PostgreSQL-backed data flows and cloud- deployed services (AWS/GCP), troubleshooting production issues(RCA), enhancing deploy/monitoring workflows, and partnering with frontend, data, and business teamsโ€”while mentoring junior developers through code reviews and knowledge sharing
  • Implemented secure data access layers and business logic, modeling and optimizing PostgreSQL schemas and queries to support analytics- and ML-driven workloads and reduce query latency under peak traffic.
  • Built and operated containerized microservices running on AWS (EC2, ECS, Lambda) and GCP (GKE, Cloud Run), leveraging cloud compute and object storage (S3 / GCS) and integrating Docker, CI/CD pipelines (GitHub Actions / Azure DevOps / Jenkins), and cloud autoscaling,to ensure consistent and reliable deployments.
SOAR Splunk Elastic Tenable CrowdStrike
Telepath
IT Intern
Feb 2022 - Jul 2022 | New York, NY
  • Defined and evaluated distributed system architecture options (microservices, event-driven, scalable pipelines) across AWS, translating engineering constraints into product trade-offs that shaped ~30% of roadmap priorities for search and retrieval features.
  • Analyzed source code repositories and AI/ML workflow integration points through Git, CI/CD pipelines, and Python/Node code reviews, identifying architectural gaps that reduced feature exploration time and improved iteration speed across the team.
CI/CD Secure Review AI/ML

// Security Projects & Tools

siem_alert_analyzer.py
class SIEMAlertAnalyzer:
# Real-time SIEM alert correlation and threat detection
SIEM Console Ready... Click to generate alerts
0
CRITICAL
0
HIGH
0
MEDIUM
0
LOW
Splunk ELK Stack SIEM Threat Hunting
vulnerability_scanner.py
class CVEVulnerabilityScanner:
# Application security vulnerability assessment with CVE mapping
OWASP Top 10 Nessus Burp Suite CVE Database
incident_response.py
class IncidentResponsePlaybook:
# SOC incident triage and automated response workflow
Select an incident type to view response playbook...
NIST CSF SOAR Playbooks Forensics
threat_intelligence.py
class ThreatIntelligenceAggregator:
# IOC analysis with MITRE ATT&CK framework mapping
Enter an Indicator of Compromise to analyze...
MITRE ATT&CK VirusTotal OSINT Threat Intel

// Security Utilities

hash_generator.py
class HashGenerator:
# Generate MD5/SHA-1/SHA-256 hashes
CryptoJS MD5 SHA-256 Integrity
password_strength.py
class PasswordStrengthAnalyzer:
# Evaluate password strength and criteria
Enter a password to check strength...
Policy Entropy Validation Secure UX
base64_tool.py
class Base64Codec:
# Encode and decode Base64 safely
Base64 Encoding Decoding Safe I/O
port_scanner.py
class PortScannerSim:
# Simulated network port scanning visualization
Network Security Nmap Reconnaissance TCP/IP