███████╗████████╗██╗ ██╗██╗ ██████╗ █████╗ ██╗ ██╗ ██╗ █████╗ ██████╗██╗ ██╗███████╗██████╗
██╔════╝╚══██╔══╝██║ ██║██║██╔════╝██╔══██╗██║ ██║ ██║██╔══██╗██╔════╝██║ ██╔╝██╔════╝██╔══██╗
█████╗ ██║ ███████║██║██║ ███████║██║ ███████║███████║██║ █████╔╝ █████╗ ██████╔╝
██╔══╝ ██║ ██╔══██║██║██║ ██╔══██║██║ ██╔══██║██╔══██║██║ ██╔═██╗ ██╔══╝ ██╔══██╗
███████╗ ██║ ██║ ██║██║╚██████╗██║ ██║███████╗ ██║ ██║██║ ██║╚██████╗██║ ██╗███████╗██║ ██║
╚══════╝ ╚═╝ ╚═╝ ╚═╝╚═╝ ╚═════╝╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝
[SYSTEM] Initializing system...
[BOOT] Loading core modules
[INIT] Mounting file systems [OK]
[LOAD] Starting network services [OK]
[EXEC] Loading portfolio.sh
[INIT] Initializing user interface [OK]
[DONE] System ready [READY]
Protecting systems — one vulnerability at a time
$ ./get_profile.sh
Security Analyst with expertise in:
> Vulnerability Assessment & Penetration Testing
> Network Security & Incident Response
> Ethical Hacking & Cyber Forensics
$ cat contact.txt
Email: divyaramaniofficial@gmail.com
LinkedIn: linkedin.com/in/divya-patel
$ _|
Hi! I'm Divya Patel, a passionate Cybersecurity Analyst with a strong foundation in IT infrastructure, network security, and ethical hacking.
A recent graduate with hands-on experience in VAPT, penetration testing, and secure network architecture. Highly motivated, quick to learn, and adept at problem-solving — ready to contribute effectively to cybersecurity initiatives and IT infrastructure projects.
Currently working as a Security Analyst at LetsDefend Infosec, where I conduct security assessments, monitor threats, and collaborate on building secure systems. CEH certified with practical experience across multiple security domains.
const analyst = {
name: "Divya Patel",
role: "Security Analyst",
location: "Modasa, Gujarat, IN",
expertise: [
"VAPT",
"Penetration Testing",
"Incident Response",
"Cyber Forensics"
],
tools: [
"Metasploit",
"Burp Suite",
"Wireshark",
"Nessus"
],
certified: "CEH — EC-Council"
};
Lead comprehensive security assessments and vulnerability management programs across enterprise infrastructure. Execute Governance, Risk & Compliance (GRC) initiatives including policy development, risk assessments, and regulatory compliance audits (ISO 27001, NIST CSF). Perform advanced Vulnerability Assessment and Penetration Testing (VAPT) on web applications, networks, and cloud environments using Metasploit, Burp Suite, Nessus, and OWASP methodologies. Orchestrate incident response operations, conduct digital forensics investigations, design defense-in-depth security architectures, and deliver technical security awareness training to organizational stakeholders.
Developed responsive web applications using Angular and TypeScript with component-based architecture, dependency injection, and reactive forms. Implemented state management with RxJS observables, integrated RESTful APIs with HTTP interceptors, and deployed JWT-based authentication. Optimized performance through lazy loading and code splitting, achieving 40% faster load times. Participated in Agile/Scrum sprints with daily stand-ups and code reviews. Ensured cross-browser compatibility, WCAG accessibility compliance, and mobile-first responsive design using CSS Grid, Flexbox, and Bootstrap. Collaborated with backend teams on API design and maintained CI/CD pipelines for automated deployment.
Specializations in Data Centre Management, Application Security, and Ethical Hacking. Hands-on training in Windows/Linux OS Security, Network Fundamentals, Threat Detection, Cyber Forensics, and Public Key Infrastructure.
Graduated with First Class with Distinction. Strong foundation in computer science fundamentals, software engineering, data structures, and system design. Led multiple academic projects including an online bidding system.
Premier certification demonstrating mastery in ethical hacking frameworks, advanced penetration testing methodologies, comprehensive vulnerability assessment protocols, threat modeling, exploit development, and cybersecurity offensive techniques. Globally recognized credential validating expertise in identifying and mitigating security vulnerabilities across enterprise infrastructure.
Intensive postgraduate program specializing in advanced cybersecurity domains including ethical hacking, digital forensics and incident response, network security architecture, application security testing, GRC frameworks, compliance auditing (ISO 27001, NIST, CIS), vulnerability management, and secure IT infrastructure design and implementation.
Advanced cybersecurity professional specializing in Governance, Risk & Compliance (GRC) frameworks (ISO 27001, NIST CSF), Information Security Audits, and Vulnerability Assessment & Penetration Testing (VAPT). Expert in network security architecture, threat modeling, compliance gap analysis, and penetration testing across web applications, cloud infrastructure, and enterprise systems using Metasploit, Burp Suite, Nessus, and Wireshark.
Executed comprehensive Vulnerability Assessment and Penetration Testing on IoT ecosystems and network infrastructure. Utilized advanced security tools including Nessus, OpenVAS, Metasploit Framework, Burp Suite, Wireshark, and Snort IDS for vulnerability discovery, exploit validation, and network traffic analysis. Delivered actionable remediation strategies and implemented defense-in-depth security countermeasures.
Architected and developed a scalable real-time online bidding platform from concept to deployment. Implemented Angular frontend with responsive UI/UX, Node.js/Express backend API, WebSocket protocol for real-time bidding updates, JWT-based authentication and authorization, and RESTful architecture. Successfully delivered through Agile/Scrum methodology with sprint planning, code reviews, and continuous integration.
Earned Bachelor of Engineering degree in Computer Engineering with First Class Distinction from Government Engineering College, Modasa, affiliated with Gujarat Technological University (GTU). Comprehensive curriculum covering data structures, algorithms, software engineering, network architecture, database management, and computer security fundamentals with strong foundation in system design.
Managed comprehensive Vulnerability Assessment and Penetration Testing for IoT devices and networks. Employed various testing techniques to identify vulnerabilities, simulate real-world attacks, and implement structured security countermeasures.
Discuss →Led development of a real-time online bidding platform from concept to deployment using Agile methodology. Implemented WebSocket for live bidding updates, JWT for secure authentication, and collaborated with UI/UX and QA teams.
Learn More →Developed and enforced comprehensive security policies at LetsDefend Infosec. Conducted audits, leveraged threat detection tools, responded to security incidents, and delivered cybersecurity awareness training to staff.
Learn More →