Skip to content
View sairambokka's full-sized avatar

Block or report sairambokka

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
sairambokka/README.md

Hi there, I'm Sairam Bokka! 👋

LinkedIn GitHub Email

🎯 About Me

I'm a passionate and results-driven Cybersecurity Professional with a Master of Science in Cybersecurity (GPA 4.0/4.0) from the University of Maryland, Baltimore County. I'm dedicated to enhancing security posture, automating processes, and building robust, fault-tolerant systems. My expertise spans security engineering, software development, and network penetration testing, always with a keen eye on best practices for secure and efficient deployments.

🔍 Currently seeking opportunities where I can apply my skills in cybersecurity, software development, and automation to contribute to innovative projects and secure critical infrastructure.


🚀 Skills & Expertise

🏆 Certifications

  • CompTIA Security+

🔒 Security Tools

Splunk Nmap Nessus Wireshark

Splunk Nmap Nessus Sysmon Wireshark Atomic Red Team Active Directory

⚙️ DevOps & Frameworks

Docker Jenkins GitHub Maven

💻 Programming Languages

Python Java TypeScript JavaScript Bash HTML5 CSS3

🖥️ Platforms & Operating Systems

Windows macOS Linux Unix

🗄️ Databases & Web Technologies

SQL REST API JSON XML

Relational Databases (SQL) JDBC RESTful Web Services JSON XML


🌱 Professional Experience

💼 Software Engineering Intern | RootsID LLC

Feb 2025 - May 2025

  • 🔐 Developed a custom TypeScript step runner to enhance cryptographic verification chains, enabling secure root of trust integration and improving authentication integrity by 30% in decentralized identity systems
  • 🐳 Configured Docker Compose for 4+ interdependent microservices across distributed Linux environments, improving fault-tolerant deployment workflows and reducing environment setup time by 25%
  • 👥 Collaborated with a 5-person cross-functional team to integrate identity workflows into a browser extension, enabling upload of JSON/YAML configurations and improving client/credential provisioning speed by 40%
  • 📁 Built a secure JavaScript-based file upload module to execute identity verification workflows, improving user onboarding speed by 35% and enhancing usability of the self-sovereign identity system

🛡️ Security Engineering Intern | Tenable Network Security

June 2024 - August 2024

  • 🤖 Developed a Python-based Slack bot that automated security advisory lookups across 8 Oracle Linux repos, reducing response time from 3-5 days to less than 24 hours and improving vulnerability triage efficiency by 80%
  • 🐳 Containerized the security bot using Docker and implemented 50+ unit tests to achieve 95% code coverage, ensuring reliability and fault tolerance in cloud-based deployments
  • 🔄 Built and deployed a Jenkins-based CI/CD pipeline integrated with Git, enabling 5+ automated builds/day and reducing manual test/deployment effort by 40%
  • ☁️ Deployed bot on Linux cloud server with 99.9% uptime, securing secrets using environment variables to meet secure configuration and IAM best practices
  • 🔄 Participated in migration testing and peer code review for Tenable Security Center, ensuring secure data transfer and OS compatibility in large-scale infrastructure upgrade from CentOS 7 to Oracle Linux 8

💡 Featured Projects

🔍 Malware Reverse Engineering - Software Reverse Engineering (November 2024)
  • 🕵️ Reverse-engineered a malware sample using Ghidra, identifying its Command & Control (C2) server and analyzing its network communication protocol, socket connections, and message structures
  • 🔬 Examined malware functionality, including file operations, remote command execution, directory changes, and metadata exfiltration
  • 📊 Compiled findings into a detailed technical report, mapping behaviors to MITRE ATT&CK framework and recommending mitigation strategies
🤖 Endpoint Detection and Response using Deep Learning - Deep Learning (May 2024)
  • 🧠 Engineered a custom deep learning model for EDR using Python and TensorFlow
  • 📈 Achieved impressive performance metrics:
    • Accuracy: 0.89
    • Precision: 0.86
    • Recall: 0.91
    • F1-score: 0.88
🏢 Enterprise Security Lab - Active Directory, Splunk, Atomic Red Team (August 2024)
  • 🖥️ Deployed Active Directory on Windows Server 2022 with organizational units and user policies
  • 📊 Configured Splunk with Sysmon and Universal Forwarders on Ubuntu for enhanced Windows endpoint visibility
  • ⚔️ Conducted adversary simulation using Atomic Red Team aligned with MITRE ATT&CK techniques
🔓 Network Penetration Testing - Cyber Practitioner Development Lab (May 2024)
  • 🎯 Executed comprehensive penetration tests on 4 vulnerable machines
  • 🔍 Identified and exploited high-risk vulnerabilities using Nmap and Nessus
  • 💻 Successfully breached target systems by exploiting weak passwords, outdated software, and open ports
  • 📋 Produced detailed technical reports with remediation strategies
📊 Risk Assessment of Investment Firm - Risk Analysis and Compliance (December 2023)
  • 🏦 Conducted comprehensive risk assessment against New York DFS regulations
  • 📋 Created thorough risk register with 12 findings and remediation strategies
  • 💰 Performed cost-benefit analyses and prioritized 5 very high-risk areas

🌟 Featured GitHub Projects

A novel, AI-driven firewall that uses a fine-tuned Large Language Model to classify live network packets and detect intrusions in real-time.

🔥 Key Features:

  • 📡 Live Packet Analysis: Developed a data pipeline using Python and Scapy to sniff, preprocess, and classify live network traffic for intrusion detection.
  • 🧠 AI-Powered Detection: Leverages a 20-billion parameter model (unsloth/gpt-oss-20b) to intelligently classify packets as safe or malicious.
  • 🛠️ Custom Model Fine-Tuning: Fine-tuned on the industry-standard UNSW-NB15 dataset to create a highly specialized and efficient classifier.
  • Efficient Performance: Utilized 4-bit quantization with Unsloth and PyTorch for high-speed, low-memory model inference.

🛠️ Tech Stack: Python, Scapy, PyTorch, Transformers, Unsloth, Pandas

A multi-agent AI system that performs comprehensive security analysis of web applications using automated browser testing and intelligent vulnerability assessment.

🔥 Key Features:

  • 🤖 Multi-Agent System: Constructed a system of specialized AI agents using CrewAI and NVIDIA models to automate web security assessments.
  • 🌐 Automated Browser Testing: Integrated Selenium for live browser testing, allowing agents to analyze real-time network traffic and DOM data.
  • 🛡️ In-Depth Vulnerability Analysis: Assesses for critical frontend vulnerabilities including Cross-Site Scripting (XSS) and insecure Content Security Policies (CSPs).
  • 📄 Comprehensive Reporting: Consolidates findings from all agents into detailed reports with actionable remediation steps.

🛠️ Tech Stack: Python, CrewAI, NVIDIA AI, Selenium, Exa AI

A powerful multi-agent framework that automates and streamlines Open Source Intelligence (OSINT) gathering on corporate entities using a team of specialized AI agents.

🔥 Key Features:

  • 🤖 11 Specialized Agents: Orchestrated a framework using CrewAI to deploy a team of agents, each with a unique OSINT task.
  • Parallel Processing: Agents work asynchronously to gather intelligence across multiple domains simultaneously for maximum efficiency.
  • 📊 Multi-Domain Analysis: Enabled agents with Exa Search to investigate network infrastructure, social media presence, and business data.
  • 📝 Automated Reporting: Culminates all findings into comprehensive and structured intelligence reports.

🛠️ Tech Stack: Python, CrewAI, Exa AI, Langchain

A Model Context Protocol (MCP) server that exposes MISP IOC retrieval functions to MCP-compatible clients like Claude Desktop.

🔥 Key Features:

  • 📅 Get Recent IOCs: Retrieve IOCs from last 24 hours
  • 📊 IOC Summary: Statistics and counts by IOC type
  • 🔍 Filter by Type: Get IOCs by specific types (IP, domain, URL, etc.)
  • 💾 Save to File: Export IOCs to JSON files
  • 🔗 Connection Check: Verify MISP connectivity

🤝 Let's Connect!

💬 I'm always open to discussing cybersecurity, software development, and innovative tech solutions!

LinkedIn Email GitHub


⭐️ From sairambokka

"Securing the digital world, one line of code at a time" 🛡️

Popular repositories Loading

  1. ollama-coding-agent ollama-coding-agent Public

    Python 5

  2. OSINT-Agent-Orchestration OSINT-Agent-Orchestration Public

    A powerful multi-agent setup to simplify OSINT analysis of a company

    Python 1

  3. langchain-deep-research-agent langchain-deep-research-agent Public

    Python 1

  4. Object-Oriented-Programming Object-Oriented-Programming Public

    Java

  5. Javascript Javascript Public

    HTML

  6. JSP-Concepts JSP-Concepts Public

    Java