Hi, I'm Samyukta Kurikala

Aspiring digital forensics analyst specializing in malware forensics and memory analysis, and an open-source contributor. When I have downtime, you'll find me either lost in a book or strategizing in a PC game.

Samyukta Kurikala

Skills

Security Tools

  • Wireshark
  • Nmap
  • Autopsy
  • SIEM Platforms(Splunk, Security Onion)
  • Volatility
  • Nessus
  • BurpSuite

Programming

  • Python scripting
  • C/C++
  • SQL
  • Bash
  • PowerShell

Network Security

  • Firewalls & IDS
  • VLANs
  • Router Configuration
  • Packet Analysis
  • Network Segmentation
  • Incident Response

Infrastructure

  • Docker
  • Git
  • Linux (Ubuntu, Kali, Parrot)
  • Windows
  • Active Directory
  • VMWare

Frameworks

  • NIST CSF
  • ISO 27001
  • Risk Assessment

Education

Master of Science in Cybersecurity

Northeastern University - 2024 to Present

Key Courses: Software Vulnerabilities and Security, Network Security; Cybersecurity: Technologies, Threats and Defense; Information System Forensics; Cyberlaw

GPA: 3.75/4.0

Bachelor of Technology in Computer Science and Engineering

SRM Institute of Science and Technology – 2020 to 2024

Key Courses: Computer Networks; Operating Systems; Network Security; Artificial Intelligence; Computer Communications

GPA: 9.21/10

Projects

WiCyS x Target Cyber Defense Challenge 2025 Writeup

Tier 1 writeup of the WiCyS x Target Cyber Defense Challenge 2025.

Coming Soon

Forensic Case Studies

Comprehensive collection of digital forensic case studies conducted as part of the CY5210 Information System Forensics course at Northeastern University.

View on Github

Secure Instant Messaging System

Developed a terminal-based Python chat system integrating SRP for password authentication, ECDH for key exchange, and AES-GCM for encrypted messaging.

View on Github

Encrypted Video Transmission over Wi-Fi

Developed an algorithm to encrypt and decrypt live videos and transmit them over Wi-Fi.

View on GitHub

Phishing Hook

A phishing detection system that utilizes deep learning techniques to detect and prevent phishing attempts.

View on Github

Work Experience

Project Intern

Defence Research and Development Organisation, India

August 2023 - November 2023

• Architected and implemented a secure video transmission system utilizing AES encryption and symmetric key cryptography.
• Developed a real-time streaming platform with end-to-end encryption over Wi-Fi.
• Integrated PyCrypto for robust encryption and OpenCV for efficient video processing.
• Implemented frame shuffling and anti-tampering mechanisms to thwart man-in-the-middle attacks.

Network Security Intern

MSN Laboratories, India

June 2023 - July 2023

• Managed and configured network security infrastructure including routers, switches, and firewalls.
• Implemented VLAN segmentation and performed regular security monitoring with Wireshark/tcpdump.
• Analyzed firewall logs to identify and report potential threats; improved incident response protocols.

Hands-On Training

Certifications and Badges

ISC2 CC

ISC2

Google Cybersecurity Professional Certificate

WiCyS + Coursera

Positions

Head of Finance and FOSS contributor

null NEU - University Cybersecurity Club

Served on the executive board supporting club operations and growth initiatives for Northeastern's graduate cybersecurity club, nullNEU

Contributions:
- Executive Board: Coordinate with leadership team on club planning, budgeting, and event organization
- Open Source Development: Contributed code to the club's website repository on GitHub
- Community Building: Led outreach efforts at tabling events to drive membership growth for upcoming semesters
- Active Participation: Engage in monthly security meetups, technical workshops, and knowledge-sharing sessions

Member

Women in Cybersecurity (WiCyS)

Actively engaged in WiCyS programs focused on cybersecurity skill development and professional growth:

- Target Cyber Defense Challenge: Qualified for Tier 2 (Attack Track) as one of 50 participants globally selected to advance from Tier 1 Defense Track, demonstrating proficiency in both defensive and offensive security operations.
- Security Training Scholarship Program: Recipient of scholarship and qualified for Tier 2 CTF competition, advancing through competitive selection process.
- Google Cybersecurity Certificate Program: Completed professional certification through WiCyS-sponsored program.
- ISC2 Partnership Programs: Selected for ISC2 Fall Camp and currently pursuing ISC2 Certified in Cybersecurity (CC) certification.
- Vulnerability Disclosure Program (VDP) Challenge: Participant identifying and reporting security vulnerabilities in real-world applications.
- WiCyS Mentorship Program: Active mentee receiving guidance from experienced cybersecurity professionals.

Interests & Hobbies

Reading

Favorite Genres: Mystery, thriller and plot twists

Currently Reading: "The Psychology of Money" by Morgan Housel

2025 Goal: Read 24 books and explore more non-fiction books

View my Goodreads

Gaming

Video Games: GTA 5, Black Myth Wukong, Elden Ring

Board Games: Scotland Yard, Catan, Backdoors and Breaches.

CTF Competitions

Platforms: CyberDefenders, HacktheBox, and TryHackMe

Favorite Challenges: Browser analysis, memory analysis, and malware analysis

Recent: Participated in WiCyS SANS CTF 2025

Art

Digital: Learning Procreate on iPad and exploring digital illustration

Traditional: Sketching with pencils and experimenting with watercolors. Just started my artistic journey and loving the creative process of bringing ideas to life!