Kritan.Aryal
System Authentication
Security Clearance0%
Status: Secure
Instance: #8A2D
Open to opportunities
Aspiring

Cybersecurity
Analyst

Focused on threat detection, vulnerability assessment, and building resilient security architectures.

· SOC Analyst · Blue Team Operations · GRC · IS Audit
Kritan Portfolio Image
About

Building a career in protecting digital systems and data.

Enthusiastic student of cybersecurity who has practical experience in network scanning, traffic analysis, and vulnerability testing. Skilled in tools such as Nmap, Wireshark, Metasploit, and Burp Suite and heavily oriented towards Blue Team activity, SOC processes, and threat identification.

Curiosity leads me to investigate real-life attack scenarios and defense techniques to develop real-world, job-ready skills. I also am becoming skilled in Information Security Audit, Risk Management and Compliance (GRC), coordinating security practices with business and regulatory requirements.

Known for being disciplined, ethical, and continuously learning in the evolving field of cybersecurity.

5+
CTF competitions
2
Industry certifications
10+
Security projects
Expertise

Technical Skillset.

Category_1

Cybersecurity & InfoSec

Practical knowledge of threat detection, vulnerability assessment, and risk mitigation with hands-on experience in cybersecurity labs.

Technologies

Threat Detection (Wireshark)Vulnerability Assessment (Nmap, OpenVAS)Risk Mitigation
Category_2

SOC & Blue Team Basics

Hands-on experience in security monitoring, log analysis, and incident response using SIEM tools and network traffic analysis.

Technologies

Security MonitoringLog Analysis (Splunk / Wazuh)Incident ResponseSIEM ConceptsTraffic Analysis
Category_3

IS Audit & GRC

Understanding of risk management, compliance frameworks, and security auditing aligned with organizational governance and policies.

Technologies

Risk ManagementComplianceSecurity AuditingGovernancePolicies
Category_4

Technical Arsenal

Strong practical knowledge of Networking (TCP/IP, DNS, Packet Analysis), Security Tools (Nmap, Metasploit, Burp Suite), and OS (Linux – Kali, Ubuntu | Windows).

Technologies

TCP/IPDNSWiresharkNmapMetasploitBurp SuiteKali LinuxUbuntu
Category_5

Security Reporting

Proficient in Technical Documentation and Security Reporting, translating complex technical findings into clear, actionable audit reports and risk assessments.

Technologies

Audit ReportsVulnerability DocumentationCompliance ReportsTechnical Writing
Category_6

Programming & Scripting

Security scripting using Python and Bash for automation, log analysis, and development of basic security tools.

Technologies

PythonBashAutomationSecurity ScriptingTool Development
Contact

Let's build
something secure.

Secured Message Channel