Cybersecurity Professional

Rama Ramana Sharma Parnandi

Security Researcher | Threat Detection Specialist | SIEM Engineer

Master's student in Computer Science at The Ohio State University with a focus in Systems and Network Security. Open to full-time opportunities starting May 2026 and available for internships.

MS CSE The Ohio State University
Security Research W3CIL Lab

Professional Experience

Feb 2025 – Present

Student Data Specialist

ICDT (Institute for Cybersecurity & Digital Trust) : Columbus, OH

  • Engineered the migration of internal data from Flask/MySQL architecture to Django, leveraging Django ORM to optimize database performance and security
  • Designed automated Python scripts to sanitize and process sensitive financial datasets, reducing manual data handling risks and ensuring 99.9% reporting accuracy
  • Implemented Role-Based Access Control (RBAC) within the new Django architecture to strictly limit data exposure to authorized personnel
Sep 2023 – Present

Security Researcher & Technical Content Lead

CyberToolGuardian : Remote

  • Architected and documented full-stack security monitoring pipelines, integrating Zeek and Suricata logs into ELK Stack (Elasticsearch, Logstash, Kibana) for real-time threat analysis
  • Demonstrated advanced threat detection workflows, such as configuring Wazuh with Yara signatures (Valhalla) to identify and block polymorphic malware families
  • Published comprehensive technical guides on configuring OpenSearch and X-Pack security features, serving as a practical resource for security practitioners
Dec 2023 – Jun 2024

AI Security Intern

DigitalFortress Private Limited : Amaravati, India

  • Conducted threat modeling on AI/ML pipelines to identify vulnerabilities such as model inversion and data poisoning attacks
  • Researched and documented emerging Artificial Intelligence security risks to update the organization's internal security posture and defense strategies
Nov 2023 – Feb 2024

GRC Intern

CyRAACS™ : Bengaluru, India

  • Assisted in conducting organizational risk assessments aligned with NIST and ISO 27001 standards to identify compliance gaps
  • Executed Data Localization audits and RBI-mandated compliance checks, ensuring regulatory adherence for financial data sovereignty

Featured Projects

Advanced Pcap Xray v2

Network forensic automation tool with live analysis capability that parses PCAP files to generate interactive topology graphs. Features automated ISP geolocation, color-coded malicious actor identification via AbuseIPDB API integration, and real-time Zeek log analysis.

Python Zeek AbuseIPDB API Network Forensics
View on GitHub

Orion - Threat Intelligence Automation

Advanced threat intelligence platform featuring automated malicious IP detection and email alerting system. Implements intelligent API fallback mechanisms and comprehensive reporting. Collaborative project with formal setup and final reports demonstrating enterprise-level documentation.

Python Threat Intelligence API Integration Automation
View on GitHub

Automated IPS Rule Generator

Python-based automation tool that dynamically generates Suricata blocking rules by querying threat intelligence APIs. Identifies malicious IPs and creates IPS rules for real-time network protection. Featured in published Medium article with complete setup guide.

Python Suricata AbuseIPDB IDS/IPS
View on GitHub

Enterprise SIEM Deployment

Deployed a Hybrid ELK (HELK) stack to simulate an enterprise SOC environment. Configured ElastAlert to detect Active Directory attacks (e.g., Zerologon) via log correlation, enabling proactive threat hunting and incident response.

HELK Kafka Docker Winlogbeat
View on GitHub

Malware Classification Model

Built a machine learning model for malware classification into families using Convolutional Neural Networks (CNN). Trained on static features extracted from PE, ELF files to identify and categorize malware specimens.

Python TensorFlow CNN
View on GitHub

Malware Clustering (Static)

Clustered PE, ELF based malware families using static feature extraction with the EMBER pipeline, then applied K-Means and DBSCAN to group samples for triage and label enrichment. Built analysis notebooks to explore feature importance and cluster quality.

Python EMBER K-Means DBSCAN
View on GitHub

Technical Proficiencies

Industry-standard tools and frameworks for enterprise security

Security Tools

Suricata Zeek Snort Wazuh Ghidra Volatility Cowrie Nmap Wireshark Burp Suite angr Qiling

Infrastructure & Platforms

AWS ELK Stack Elasticsearch Logstash Kibana OpenSearch Docker Kafka

Programming Languages

Python Java SQL C Bash Scripting JavaScript

Compliance & GRC

NIST Framework ISO 27001 Threat Modeling Risk Assessment Data Localization

Let's Connect

Open to full-time opportunities starting May 2026 | Available for internships

Available for Full-Time Opportunities

Starting May 2026 | Open to Summer 2026 Internships

Professional Profiles

Ready to move faster on detection and response?

Let's build repeatable security wins together.