About me
Hi, I am Swetha, a cybersecurity engineer. I spend my days weaving together penetration testing, red teaming, cloud security, and IAM design. For me, every log feels like a clue, every vulnerability a plot twist, and every solution a way to close the story with a stronger, smarter ending.
I see cybersecurity as a story,once I step into it with every engagement, starting with reconnaissance, tracing the outlines of a system like the opening chapter of a mystery. Scanning follows, the plot thickening as hidden entry points reveal themselves. Then comes exploitation and post-exploitation, where theory meets action and each move rewrites the narrative. Finally, reporting closes the loop, turning raw findings into a roadmap for stronger defenses.
Somewhere in between the lines, you will usually find me with a cup of coffee in hand, chasing focus. And when the story winds down, biryani is home; it isthe comfort that reminds me why I do what I do.
What i'm doing
-
Penetration Testing
I execute the full penetration testing lifecycle—reconnaissance, exploitation, and reporting—to uncover critical vulnerabilities and deliver clear, actionable recommendations that help organizations strengthen their defenses.
-
Red Teaming
By emulating real-world adversaries, I go beyond checklists to test security at its core—identifying blind spots, validating controls, and helping teams stay one step ahead of evolving threats.
-
Cloud Security & IAM
I architect and enforce secure access frameworks, design IAM policies, and harden cloud environments—bridging security best practices with real-world business needs to keep systems both safe and scalable.
-
Incident Response & Threat Hunting
From analyzing logs to coordinating containment, I bring structure and speed to incident response—rooting out threats, minimizing impact, and translating technical findings into strategies stakeholders can act on.