Shrutika Joshi

🔐 Hey there! I’m Shrutika Joshi - Cybersecurity Professional

Defending digital frontiers with 7+ years of expertise in Security Operations, cloud security, Threat Detection, Incident Response, and DevSecOps. I hold a Master’s in Cyber Security from the University of Maryland - Baltimore County and bring a strong foundation in DevSecOps, application security, and vulnerability management.

Curiosity drives me. I believe in lifelong learning and thrive on understanding how emerging technologies can reshape cybersecurity.

Outside of work, I find peace and inspiration through bird photography. Capturing the delicate balance of nature helps me stay observant and detail-oriented—skills that translate beautifully into my approach to cybersecurity.

I’m always eager to connect with like-minded professionals, collaborate on innovative projects, and share knowledge across the cybersecurity community.

View My Resume

💡 Passionate About:

AI in cybersecurity, automating security processes, and staying ahead of emerging threats. I love sharing insights on AI hacking, SecOps, DevSecOps, Threat Intelligence, cloud security, and Application Security.

👨‍💻 What I Bring to the Table:

Incident Response & Threat Hunting: Defending against cyber threats, analyzing security events, and mitigating attacks.

Cloud Security (AWS & Azure): Hardening cloud environments and implementing security best practices.

DevSecOps & Application Security: Embedding security into the development pipeline.

Security Tools & Automation: SIEM (Splunk), EDR (CrowdStrike), DLP (Symantec), Python scripting for security automation.

📜 Certifications:

🛠️ Skills

Technical Skills
  • Security Operations
  • Incident Response
  • Cloud Security
  • DevSecOps
  • Application Security
Tools & Technologies
  • Crowdstrike
  • Splunk
  • AWS Security Tools
  • Symantec DLP
  • Azure Security Center
Soft Skills
  • Problem-Solving
  • Teamwork
  • Communication
  • Leadership

📝 Blog

Preparation for GCIH certification

My Journey with SANS SEC504: Hacker Tools, Techniques & Incident Handling and GCIH Certification Attempt

Securing Cloud Infrastructure: Best Practices

Learn how to safeguard your cloud resources against common security threats and vulnerabilities...

Top Threats to Watch Out for in 2025

Stay ahead of the curve by understanding the emerging cybersecurity threats for the coming years...

🚀 Projects

One National Investments – Risk Assessment

Conducted a comprehensive risk assessment of One National Investments for my 'Risk Analysis & Compliance' course project.

View Project

Cyber Lab - Ethical Hacking

This project is focused on conducting ethical hacking using tools nmap, wireshark, burpsuite, and OSINT tools for reconnaissance. In this project, I have done reconnaissance, network scanning, vulnerability analysis using Nessus, exploiting a system using metasploit, password cracking using Ophcrack & hydra, Sniffing & poisoning network using Ettercap, using MSFVenom backdoor activity, using aircrack-ng to crack wireless traffic

View Project

Cloud Security Best Practices

Comprehensive guidelines for securing AWS and Azure cloud environments to minimize risks.

View Project

🔗 Let’s Connect!

Feel free to reach out through any of the platforms below:

LinkedIn Email Instagram - Bird Photography