// security engineer · hyderabad, india

SAI VISWA

SOC Engineer · VAPT Analyst · Cloud Security

Building and defending enterprise security infrastructure at Cyberexperts. Specializing in SIEM engineering, threat detection, observability stacks, and cloud security posture management on Azure & AWS.

sai@VISWA-SPACE:~
$ whoami sai_viswa $ cat role.txt SOC Engineer @ Cyberexperts $ cat skills.txt SIEM · VAPT · Cloud Security Threat Intel · Observability $ cat next_goal.txt OSCP — Offensive Security Certified Professional [IN PROGRESS] $ _
01

ABOUT

I'm Sai Viswa, a Security Engineer based in Hyderabad with hands-on experience building and operating enterprise-grade SOC infrastructure. My work sits at the intersection of threat detection, observability, and cloud security.

At Cyberexperts, I manage multi-server Azure infrastructure, deploy and integrate security monitoring tooling across Windows and Linux environments, conduct VAPT engagements, and perform cloud security posture assessments on AWS using ScoutSuite and Prowler.

I'm currently preparing for OSCP to sharpen my offensive security skills and bring a red team perspective to my blue team work.

10+
Certifications
3
Cloud Platforms
200+
Monitored Endpoints
14
SOC Connectors
// location Hyderabad, Telangana
// company Cyberexperts
// role SOC Engineer · VAPT · Networking
// primary_os Windows 11 (VISWA-SPACE)
// attack_os Kali Linux
// cloud Azure · AWS · GCP
// next_cert OSCP [IN PROGRESS]
// status ● Available
02

SKILLS

// SIEM & Detection
Wazuh ELK Stack 9.x Graylog Fleet Server Elastic Agent Sysmon Osquery Winlogbeat
// SOAR & Threat Intel
Shuffle SOAR SOCFortress CoPilot TheHive AlienVault OTX VirusTotal Domain Stats Velociraptor Sublime
// Observability
Grafana Prometheus Loki Grafana Alloy Grafana Tempo OpenTelemetry InfluxDB Blackbox Exporter
// VAPT & Offensive
Kali Linux Nmap Metasploit Burp Suite Wireshark Nikto Gobuster SQLmap
// Cloud Security
ScoutSuite Prowler Azure NSG AWS IAM Azure Sentinel AWS Security Hub
// Infrastructure & DevOps
Docker Docker Compose Portainer HAProxy Nginx Azure VMs PowerShell Bash
03

CERTIFICATIONS

CEH
Certified Ethical Hacker
EC-Council
MAR 2025
EH
Ethical Hacker
Cisco
DEC 2024
CCP
AWS Certified Cloud Practitioner
Amazon Web Services
APR 2023
AAG
AWS Academy Graduate
Amazon Web Services · Cloud Foundations
OCT 2022
AZR
Designing Azure AI Solution
Microsoft
MAR 2023
DEV
Implementing DevOps Solutions
Microsoft
APR 2023
M365
Microsoft 365 Administrator
Microsoft
AUG 2025
TIA
Foundation Level Threat Intel Analyst
arcX
FEB 2025
AoC
Advent of Cyber 2024
TryHackMe
DEC 2024
ITS
Information Technology Security
Pearson
SEP 2022
OSCP — Next Target
Offensive Security Certified Professional · OffSec PEN-200 · Currently in active preparation
IN PROGRESS
04

TECH STACK

// Security & SIEM
Wazuh Manager Wazuh Indexer ELK Stack 9.x Fleet Server Elastic Agent Graylog Sysmon Osquery Velociraptor Sublime SOCFortress CoPilot Shuffle SOAR TheHive AlienVault OTX VirusTotal ScoutSuite Prowler
// Observability
Grafana Prometheus Loki Promtail Grafana Alloy Grafana Tempo OpenTelemetry Collector Windows Exporter Blackbox Exporter Node Exporter InfluxDB v2.8 Tetragon eBPF
// Infrastructure
Azure VMs Azure NSG Docker Docker Compose Portainer HAProxy Nginx Let's Encrypt SSL Ubuntu 24 Windows Server 2022
// Languages & Tools
PowerShell Bash Python Apache Spark PySpark Kali Linux Nmap Metasploit Burp Suite Wireshark BloodHound impacket
05

CONTACT

I'm always open to discussing security challenges, new opportunities, or potential collaborations. If you're building something interesting in the security or observability space — let's talk.