As a passionate and dedicated cybersecurity enthusiast, my career objective is to leverage my comprehensive knowledge in computer science and cybersecurity, along with my hands-on experience in threat detection and mitigation, to protect and enhance the security infrastructure of a forward-thinking organization. I aim to contribute to the development and implementation of robust security protocols, respond effectively to emerging threats, and promote a culture of cybersecurity awareness. Through continuous learning and ethical practices, I strive to safeguard sensitive data and systems, ensuring the confidentiality, integrity, and availability of organizational assets. My objective is to secure a challenging role within a forward-thinking company, where I can contribute to enhancing cybersecurity posture, develop and implement robust security solutions, and stay at the forefront of emerging cyber trends and technologies. Ultimately, I seek to utilize my skills to ensure data integrity, confidentiality, and availability, while supporting the organization's strategic goals.
2022 - 2023 Malware Detection using Machine Learning: Malware detection using machine learning involves leveraging algorithms and models to identify and classify malicious software based on its behavior and characteristics. This approach enhances traditional signature-based detection methods by being able to identify previously unknown or evolving threats through pattern recognition and anomaly detection. I attended the National Conference on Advanced Computing and Recent Trends (NCACRT22), presenting a paper entitled Malware Detection Using Machine Learning This national conference was organized by the School of Computing Science at Sree Saraswathi Thyagaraja College, Pollachi
2025- 2026 Threat Modelling Ahuora Platform: The cybersecurity threats related to digital twin platforms created by the Ahuora Centre for Smart Energy Systems are examined in this study. Digital twins are essential to New Zealand's decarbonization efforts since they are used to model and optimize industrial energy systems. To find possible weaknesses in data inputs, cloud infrastructure, and real-time control mechanisms, the study uses threat modeling frameworks like STRIDE.
I would like to play badminton, which is the only sport I know properly. Also, I am very fond of music, which is like a medicine to me in my hard times and I am a drummer too.
Mani Bharathi, Karunakaran, vivaciousbharath03@gmail.com, +91 88382 01976, C Suite Tech Labs