Hi,
I'm Kripesh

Aspiring Cybersecurity Professional
& Continuous Learner


Let's Keep In Touch

About

Driven by a passion for tackling emerging threats and advancing cybersecurity, I have completed M.S. in Cybersecurity at Mercy University, in December 2024 with a 3.9 GPA. With a B.S. in Network Engineering & Computing (First Class Honors) and certifications in ISC2 Cybersecurity, Fortinet Certified Fundamentals Cybersecurity, Ethical Hacker (CISCO), NIST Risk Management Framework, Security Blue Team, Cisco, and ICSI Certified Network Security Specialist, I stay ahead of the ever-evolving cybersecurity landscape.

I’ve led impactful projects like "Compounding Threat Trends on National Critical Infrastructure" with Sandia National Laboratories, Snort configuration, Red Team reports, vulnerability management, and cybersecurity awareness training. With overall five years of hands-on experience as a Cyber Security Analyst and System Administrator, I have developed expertise in system administration, network security, and IT infrastructure management. My professional experience includes managing Windows and Linux environments, Microsoft 365 administration, Active Directory, firewall security, and vulnerability management, ensuring secure and efficient IT operations, and tackling complex security challenges.

Skills

Professional Skills

SQL
Python
C/C++ Programming
Linux
Cloud Computing
SIEM Tools
Splunk
IAM
PowerShell
Search Processing Language
Microsoft Tools
Red Hat
Windows Server
VPN
Active Directory
Network Protocols
Windows, MAc OS
Firewall
IDS/IPS
GitHub
Slack
Communications
Team Work
Leadership
Time Management
Attention to Details
Risk Management
Threat Analysis
Open-Source Intelligence
Network Analysis
Vulnerability Assessment
Logs and Alerts Monitoring

Education

Mercy University, Dobbs Ferry, NY

Master of Science in Cybersecurity

GPA: 3.9

Relevant Courses:
Intermediate Programming C, C++ Networking & Data Communication Distributed Database/Security Info Assurance & Management Internet Media & Security Firewall & Intrusion Detection Topics in Info Security Forensic Computing Applied Cryptography Wireless Network & Security

Leeds Beckett University (The British College), Kathmandu, Nepal

Bachelor of Science in Computing & Network Engineering

GRADE: First Class Honors

Relevant Courses:
Intelligent Systems Digital Security Advanced Database System Advanced Web Engineering Java Networking Database Design Cloud Computing Network Security Software Development Life Cycle Web Development Client/Server Computing Network Management

Experience

Beebe Healthcare, Lewes, Delaware

February 2025 - August 2025

Security Analyst

• Perform log analysis on firewall, endpoint, and server logs to detect anomalies.
• Utilize Jira for streamlined ticket management, tracking security issues, and coordinating workflow processes.
• Configure and maintain Active Directory and other security databases.
• Leverage security tools such as SentinelOne, Microsoft Defender, Cisco Security, Red Canary, and Cipher XMDR to identify, analyze, and mitigate threats effectively.system audits to ensure compliance with security policies and regulations.<
• Collaborate with system owners and vendors to implement security measures.

Vianet Communications, Jawalakhel, Lalitpur, Nepal

March 2020 - November 2021

Security Analyst

• Configured and managed security devices, including firewalls (PfSense, Palo Alto), Network Servers, Virtualization technologies, IDS/IPS, and VPNs, improving network uptime by 15%.
• Managed and resolved IT helpdesk tickets, troubleshooting software, hardware, and network-related issues.
• Administered Active Directory, Group Policy, and Entra ID (Azure AD) to enhance identity and access management.
• Automated routine administrative tasks using PowerShell scripting, improving efficiency and reducing manual errors.
• Conducted security assessments and vulnerability management using Splunk, OpenVAS, and Nessus, identifying and mitigating 15+ critical risks.
• Implemented security protocols, conducted risk assessments, and oversaw security audits.

Visva Technikos, Shankhamul, Kathmandu, Nepal

August 2018 - September 2019

System Administrator

• Configured Windows Server 2012 R2 and Red Hat Linux, improving server performance and reducing downtime by 20%.
• Performed network infrastructure maintenance and communication protocol configurations to support security initiatives.
• Created and maintained project documentation, inventory records, and detailed change logs for audit purposes.
• Diagnosed and resolved over 100 system/network issues, ensuring 99.9% system uptime.

Projects & Certifications

➣ Investigating Compounding Threat Trends on National Critical Infrastructure

Sandia National Laboratories
August 2024 – December 2024
  • • Analyzed compounded threats to national critical infrastructure across sectors.
  • • Developed and validated a comprehensive Threat Assessment Framework addressing Digital, Physical, and Human threat factors.

➣ Home Lab Setup & SIEM Implementation using Splunk

September 2024
  • • Built and configured a home lab environment to implement Splunk for SIEM.
  • • Integrated, monitored, and analyzed logs, creating dashboards and alerts for enhanced threat visibility.

➣ Microsoft Intune & Endpoint Management

May 2024
  • • Configured Intune policies for device compliance, software deployment, and security baselines, improving enterprise endpoint security by 40%.

➣ Active Directory & Group Policy Implementation

May 2024
  • • Deployed GPOs to enforce security policies, reducing unauthorized access incidents by 30%.

➣ AWS IAM Configuration & Security Management

May 2024
  • • Configured IAM roles, policies, and permissions to secure cloud resources and minimize security risks.

➣ Firewall Configuration and Rule Implementation

May 2024
  • • Configured and managed PfSense firewall, implementing various security rules to control traffic and enhance network protection.

➣ Configuring Snort and Creating Detection Rules for Network Traffic and Attack Patterns

June 2024
  • • Configured Snort on Ubuntu to monitor network traffic and developed custom detection rules, utilizing a Kali Linux attacker environment to simulate and analyze attack patterns.

➣ Developing Red Team Reports

December 2023
  • • Performed red team assessment on Windows systems using Kali Linux, utilizing tools like Nmap for information gathering and Metasploit for exploitation, followed by post-exploitation tasks.
  • • Provided security recommendations, detailed risk ratings, and mitigation strategies for identified vulnerabilities.

➣ Cybersecurity Awareness Training Delivery

July 2022
  • • Delivered training on social engineering attacks, educating students on recognizing tactics like phishing, pretexting, and baiting to prevent security breaches.

ISC2 Certified in Cybersecurity

SailPoint Identity Security Leader

Fortinet Fundamentals in Cybersecurity

Cisco Ethical Hacker

Blue Team Junior Analyst Training

Junior Cybersecurity Analyst Career Path

NIST Risk Management Framework

ICSI Certified Network Security Specialist