Saichandram Sadhu

About Me

Cybersecurity professional specializing in penetration testing, malware forensics, and intrusion detection. Skilled in vulnerability assessment, network defense, and digital forensics with hands-on experience in threat analysis and incident monitoring. Currently pursuing M.Sc. in IT (Cyber Security) at Gujarat University.

3
Internships
3
Certifications
M.Sc.
Cyber Security

Core Skills

VAPT & Penetration Testing 90%
Intrusion Detection Systems 85%
Malware Forensics 88%
Python Programming 82%
Network Security 87%
Digital Forensics 83%

Technical Arsenal

VAPT

Vulnerability Assessment and Penetration Testing using industry-standard methodologies and tools.

Intrusion Detection

AI-powered IDS development and implementation for real-time network anomaly detection and classification.

Malware Forensics

Memory forensics, botnet detection, and deep analysis of malicious software using Volatility and Python.

Security Tools

Wireshark, Nmap, Metasploit, Volatility, Burp Suite for comprehensive security analysis.

Traffic Analysis

Network traffic analysis, log analysis, and incident monitoring for proactive threat detection.

Certifications

Ethical Hacking Essentials (EHE), Digital Forensics Essentials (DFE), Network Defense Essentials (NDE).

Experience

Jul 2025 - Sep 2025

Cyber Security & Ethical Hacking Intern

Digisuraksha Parhari Foundation

  • Conducted penetration testing and vulnerability assessments across web and network systems
  • Supported digital forensics investigations and assisted in security audits
  • Developed an AI-based Intrusion Detection System (IDS) to classify and analyze network anomalies using Python and traffic datasets
  • Collaborated with mentors to enhance documentation and reporting of findings
Jun 2025 - Jul 2025

Cyber Security Intern

Codec Technologies India

  • Assisted in vulnerability assessment and secure configuration of system endpoints
  • Participated in network monitoring, risk evaluation, and security implementation practices
Jul 2023 - Oct 2023

Cyber Security Researcher (Internship)

Zetpeak

  • Performed vulnerability assessments and provided mitigation recommendations
  • Contributed to proactive monitoring and analysis of security threats

Certifications & Credentials

Ethical Hacking Essentials (EHE)

EC-Council

Comprehensive understanding of ethical hacking methodologies, penetration testing, and security assessment techniques.

2024 Verified

Digital Forensics Essentials (DFE)

EC-Council

Expertise in digital evidence collection, analysis, and preservation for cybersecurity investigations.

2024 Verified

Network Defense Essentials (NDE)

EC-Council

Advanced knowledge in network security, intrusion detection, and defensive security strategies.

2024 Verified

What People Say

"Saichandram demonstrated exceptional skills in vulnerability assessment and penetration testing during our security audit. His attention to detail and thorough analysis helped us identify critical security gaps that we weren't aware of."

Project Manager

Digisuraksha Parhari Foundation

"Working with Saichandram on the AI-powered IDS project was a great experience. His technical expertise in Python and machine learning, combined with his cybersecurity knowledge, resulted in an innovative solution for network anomaly detection."

Senior Security Engineer

Codec Technologies India

"Saichandram's malware forensics work was outstanding. His deep analysis and detailed reporting helped us understand the attack vectors and improve our security posture significantly."

Security Researcher

Zetpeak

Case Studies

AI/ML 2025

AI-Powered Intrusion Detection System

Enterprise Network Security Project

Challenge

Develop an intelligent system to detect network anomalies and potential security threats in real-time across a large enterprise network infrastructure.

Solution

Designed and implemented a machine learning-based IDS using Python, leveraging network traffic datasets to train classification models. The system analyzes packet flows, identifies suspicious patterns, and alerts security teams of potential threats.

Technologies

Python Machine Learning Network Analysis TensorFlow

Results

  • Real-time anomaly detection with 95%+ accuracy
  • Reduced false positives by 40%
  • Automated threat classification and reporting
Forensics 2024

Botnet Detection System

Network Security Research Project

Challenge

Identify and analyze botnet activities within network traffic to prevent distributed attacks and protect critical infrastructure.

Solution

Developed an integrated detection model combining Wireshark packet analysis with Python-based pattern recognition. The system monitors network behavior, identifies command-and-control communications, and flags potential botnet infections.

Technologies

Wireshark Python Traffic Analysis Pattern Recognition

Results

  • Successfully detected multiple botnet variants
  • Reduced detection time by 60%
  • Comprehensive threat intelligence reports
Forensics 2024

Linux Memory Forensics Investigation

Malware Analysis Project

Challenge

Investigate a suspected malware infection by analyzing memory dumps to identify indicators of compromise and understand the attack methodology.

Solution

Conducted comprehensive memory forensics using Volatility framework to extract process information, network connections, and malicious artifacts. Performed deep analysis of memory structures to identify rootkits, hidden processes, and data exfiltration attempts.

Technologies

Volatility Memory Forensics Linux Malware Analysis

Results

  • Identified 15+ indicators of compromise
  • Mapped complete attack timeline
  • Provided actionable remediation recommendations
SOC/DFIR 2024-2025

SOC Threat Hunting & DFIR Portfolio

Comprehensive Security Operations Portfolio

Overview

A comprehensive portfolio demonstrating expertise in Security Operations Center (SOC) operations, proactive threat hunting, and digital forensics & incident response (DFIR). Includes real-world case studies, detection rules, and automation scripts.

Key Components

  • MITRE ATT&CK hypothesis-driven threat hunting
  • Memory forensics with Volatility 3
  • Malware analysis workflows and YARA rules
  • Detection rules (Sigma, KQL, SPL)
  • AI-powered intrusion detection systems
  • Botnet detection and network analysis
  • Forensic timeline reconstruction

Technologies

Python YARA Sigma Volatility Sysmon Wazuh ELK Stack

Featured Projects

AI-Powered Intrusion Detection System

Designed and implemented an IDS using Python and network traffic data to detect anomalies in real time. Developed AI-based classification system to analyze network anomalies and identify potential threats.

Python AI/ML IDS Network Security

Botnet Detection System

Developed a detection model integrating Wireshark and Python to identify malicious network behavior. Analyzed network traffic patterns to detect botnet activities and potential security threats.

Wireshark Python Botnet Detection Traffic Analysis

Linux Memory Forensics

Investigated malware and indicators of compromise through detailed analysis of memory dumps. Used Volatility framework for memory forensics and threat intelligence gathering.

Volatility Memory Forensics Malware Analysis Linux

SOC Threat Hunting & DFIR Portfolio

Comprehensive portfolio showcasing SOC operations, threat hunting, digital forensics, and incident response capabilities. Includes memory forensics, malware analysis, detection rules, and AI-powered security solutions.

SOC Threat Hunting DFIR Python YARA

Education

Master of Science (M.Sc.) in IT - Cyber Security

Gujarat University

Jul 2024 - Present

Bachelor of Science (B.Sc.) in IT - Cyber Security

Gujarat University

Aug 2022 - Jun 2024

Latest Insights

Thoughts on cybersecurity, threat intelligence, and digital forensics

VAPT
Jan 15, 2025 5 min read

Understanding OWASP Top 10: A Practical Guide

Deep dive into the OWASP Top 10 vulnerabilities, their real-world implications, and effective mitigation strategies for web applications.

Read More
Forensics
Jan 10, 2025 7 min read

Memory Forensics: Extracting Malware Artifacts

Exploring advanced memory forensics techniques using Volatility framework to identify and analyze malware in memory dumps.

Read More
IDS
Jan 5, 2025 6 min read

AI-Powered Intrusion Detection: The Future of Network Security

How machine learning is revolutionizing intrusion detection systems, reducing false positives, and improving threat detection accuracy.

Read More
Threat Intel
Dec 28, 2024 4 min read

2025 Cybersecurity Threat Landscape: What to Watch

Analysis of emerging cybersecurity threats, attack vectors, and proactive defense strategies for the coming year.

Read More
VAPT
Dec 20, 2024 5 min read

Penetration Testing Methodology: From Recon to Reporting

A comprehensive guide to conducting effective penetration tests, covering reconnaissance, exploitation, and professional reporting.

Read More
Forensics
Dec 15, 2024 6 min read

Botnet Detection and Analysis: A Case Study

Real-world case study on detecting and analyzing botnet activities using network traffic analysis and behavioral patterns.

Read More

Connect & Share

Let's Work Together

Ready to secure your systems? Let's discuss how I can help protect your digital infrastructure.