Open to work from May 2026

Hi, I'm Samyukta Kurikala

Cybersecurity Master's student at Northeastern University with hands-on experience in digital forensics, SIEM operations, and malware analysis. Built enterprise security labs, developed detection rules, and conducted forensic investigations. Currently a TA for Cybersecurity Principles at Khoury College of Computer Sciences. Always up for coffee and book recommendations.

Samyukta Kurikala

Skills

SIEM & Detection

  • Splunk
  • Wazuh
  • Security Onion
  • Sysmon
  • Log Analysis
  • Alert Triage

Forensics & Analysis

  • Autopsy
  • Volatility
  • FTK Imager
  • Eric Zimmerman Tools
  • Memory Analysis
  • Malware Analysis
  • Artifact Analysis

Network Security

  • Wireshark
  • Packet Analysis
  • IDS/IPS
  • Firewalls
  • Network Segmentation
  • VLANs

Threat Operations

  • Incident Response
  • Threat Hunting
  • IOC Extraction
  • MITRE ATT&CK
  • EDR/XDR
  • Root Cause Analysis

Technical Skills

  • Python Scripting
  • PowerShell
  • Bash
  • Linux (Ubuntu/Kali)
  • Windows
  • Active Directory
  • Docker

Education

Master of Science in Cybersecurity

Northeastern University - 2024 to Present

Key Courses: Linux Kernel Security, Software Vulnerabilities and Security, Network Security; Cybersecurity: Technologies, Threats and Defense; Information System Forensics; Cyberlaw

GPA: 3.72/4.0

Bachelor of Technology in Computer Science and Engineering

SRM Institute of Science and Technology – 2020 to 2024

Key Courses: Computer Networks; Operating Systems; Network Security; Artificial Intelligence; Computer Communications

GPA: 9.21/10

Projects

Linux Rootkit Development

Developing a userland rootkit implementing file protection mechanisms, process hiding, and self-defense capabilities using shared object injection techniques. Currently implementing file read/write protection, file existence hiding, and deletion protection with selective access control for authorized processes.

In Progress

Central Server Security and Compliance Assessment

Conducting comprehensive security and compliance assessment for an AI healthcare company, evaluating adherence to FDA and CE compliance frameworks. Performing risk assessments, security control validation, and regulatory gap analysis.

In Progress

Enterprise SOC Home Lab

Deploying Wazuh SIEM/XDR with centralized log management from Windows workstation and hardened Linux bastion. Built dashboards for alert triage and security monitoring. Currently working on automating threat detection workflows.

View on GitHub

Digital Forensics Investigations

Investigated 4 insider threat and data exfiltration cases using Autopsy, FTK Imager, and Volatility. Analyzed USB artifacts, registry hives, and shellbags to identify IOCs. Performed malware analysis and identified anti-forensic activity through prefetch, jump list, and LNK file analysis.

View on Github

Alert Triage & Incident Response

Investigated 10+ simulated incidents covering malware, phishing, and intrusion scenarios on CyberDefenders platform. Triaged alerts, extracted IOCs using Wireshark and Volatility, and mapped findings to MITRE ATT&CK framework. Created structured incident reports documenting investigation methodology and remediation actions.

View Profile

Secure Instant Messaging System

Built encrypted peer-to-peer chat system with SRP authentication, ECDH key exchange for forward secrecy, and AES-256-GCM encryption. Implemented session key derivation using HKDF, rate limiting to prevent abuse, and multi-user support.

View on Github

Encrypted Video Transmission over Wi-Fi

Developed an algorithm to encrypt and decrypt live videos and transmit them over Wi-Fi using AES-256 encryption and custom frame-shuffling algorithms.

View on GitHub

Phishing Hook

A phishing detection system that utilizes deep learning techniques to detect and prevent phishing attempts.

View on Github

Work Experience

Graduate Teaching Assistant - Cybersecurity Principles and Practices

Khoury College of Computer Sciences, Northeastern University

January 2026 - May 2026

• Designing and developing hands-on labs covering risk management frameworks and core cybersecurity principles.
• Evaluating student assignments on Linux security fundamentals, Python/Bash scripting, and risk analysis techniques.
• Guiding 20+ graduate students during office hours on cybersecurity concepts, forensics, and compliance frameworks.

Project Intern

Defence Research and Development Organisation, India

August 2023 - November 2023

• Architected and implemented a secure video transmission system utilizing AES encryption and symmetric key cryptography.
• Developed a real-time streaming platform with end-to-end encryption over Wi-Fi.
• Integrated PyCrypto for robust encryption and OpenCV for efficient video processing.
• Implemented frame shuffling and anti-tampering mechanisms to thwart man-in-the-middle attacks.

Network Security Intern

MSN Laboratories, India

June 2023 - July 2023

• Managed and configured network security infrastructure including routers, switches, and firewalls.
• Implemented VLAN segmentation and performed regular security monitoring with Wireshark/tcpdump.
• Analyzed firewall logs to identify and report potential threats; improved incident response protocols.

Hands-On Training

Certifications and Badges

CompTIA CySA+ (In Progress)

CompTIA

ISC2 CC

ISC2

Google Cybersecurity Professional Certificate

WiCyS + Coursera

Positions

Head of Finance and FOSS contributor

null NEU - University Cybersecurity Club

Served on the executive board supporting club operations and growth initiatives for Northeastern's graduate cybersecurity club, nullNEU

Contributions:
- Executive Board: Coordinate with leadership team on club planning, budgeting, and event organization
- Open Source Development: Contributed code to the club's website repository on GitHub
- Community Building: Led outreach efforts at tabling events to drive membership growth for upcoming semesters
- Active Participation: Engage in monthly security meetups, technical workshops, and knowledge-sharing sessions

Member

Women in Cybersecurity (WiCyS)

Actively engaged in WiCyS programs focused on cybersecurity skill development and professional growth.

- Target Cyber Defense Challenge: Qualified for Tier 2 (Attack Track) as one of 50 participants globally selected to advance from Tier 1 Defense Track, demonstrating proficiency in both defensive and offensive security operations.
- Security Training Scholarship Program: Recipient of scholarship and qualified for Tier 2 CTF competition, advancing through competitive selection process.
- Google Cybersecurity Certificate Program: Completed professional certification through WiCyS-sponsored program.
- ISC2 Partnership Programs: Selected for ISC2 Fall Camp and currently pursuing ISC2 Certified in Cybersecurity (CC) certification.
- Vulnerability Disclosure Program (VDP) Challenge: Participant identifying and reporting security vulnerabilities in real-world applications.
- WiCyS Mentorship Program: Active mentee receiving guidance from experienced cybersecurity professionals.

Interests & Hobbies

Reading

Favorite Genres: Mystery, thriller and plot twists

Currently Reading: "The Krishna Key" by Ashwin Sanghi

2025 Goal: Read 24 books and explore more non-fiction books

View my Goodreads

Gaming

Video Games: GTA 5, Black Myth Wukong, Elden Ring

Board Games: Scotland Yard, Catan, Backdoors and Breaches.

CTF Competitions

Platforms: CyberDefenders, HacktheBox, and TryHackMe

Favorite Challenges: Browser analysis, memory analysis, and malware analysis

Recent: Participated in WiCyS SANS CTF 2025

Art

Digital: Learning Procreate on iPad and exploring digital illustration

Traditional: Sketching with pencils and experimenting with watercolors. Just started my artistic journey and loving the creative process of bringing ideas to life!