Cybersecurity and Technology Cover Image

About Me

Hello! I'm Sudarshan Gautam, a cybersecurity student based in London, UK, originally from Nepal. I'm passionate about digital security and specialize in cybersecurity audits and risk analysis. My focus is on transforming complex security data into clear, actionable insights, often utilizing tools like Excel to create professional dashboards and reports.


Through hands-on projects, I've gained experience in areas like threat analysis, risk scoring, and compliance tracking (including ISO 27001, NIST, and GDPR). I'm driven by the goal of helping organizations understand and strengthen their cybersecurity posture. This website serves as a portfolio to showcase my skills, projects, and journey in the field of cybersecurity.

Technical Skills

Cybersecurity Auditing
Risk Analysis & Management
Security Assessments
Penetration Testing
Web Application Security
Network Security
Cloud Security (AWS/Azure/GCP)
Incident Response
Threat Intelligence
Vulnerability Management
Compliance (ISO 27001, NIST, GDPR)
Cryptography
Security Automation (Python)
Excel Dashboarding (Security Data)

Featured Projects

Secure Web Platform Hardening

Offering expert secure web development and hardening services. I specialize in securing platforms like WordPress with custom security plugins, WAF integration, and robust data handling to protect against common web vulnerabilities.

WordPress Web Security WAF Secure Development

Data Security & Compliance Reporting

Providing secure database system design and implementation with a focus on data protection and compliance. I set up advanced encryption, access controls, and audit logging, and can generate custom reports for compliance needs (e.g., GDPR).

Data Security Database Security Encryption Compliance Reporting MySQL/SQL

Security Automation & Monitoring

Developing custom security automation tools for proactive defense. I create scripts and systems for continuous security monitoring, automated threat detection, and rapid incident response to protect your digital assets 24/7.

Security Automation Python Threat Detection Incident Response API Security

Cybersecurity Audit & Risk Dashboards

Transforming complex cybersecurity audit and risk data into clear, actionable Excel dashboards. Get visual reports with pivot tables, risk matrices, and heatmaps to understand your security posture and inform strategic decisions (ISO 27001, NIST, GDPR).

Cybersecurity Auditing Risk Analysis Excel Data Visualization Compliance

Professional Experience

Owner & Developer - Yushan Media PVT. LTD.

Aug 2019 - 2022 | Kathmandu, Nepal

  • Built and secured enterprise WordPress platform
  • Implemented comprehensive data protection measures
  • Developed secure access control systems
  • Managed backup and disaster recovery protocols

Chief Marketing Officer - Auto Parts PVT. LTD

2016 - 2019 | Kathmandu, Nepal

  • Developed secure customer database systems
  • Implemented protected marketing platforms
  • Managed secure communication channels
  • Ensured data privacy compliance

Education

BSc (Hons) Computer Science - Cyber Security Pathway

2022 - 2026 | St Mary's University, London

Key Modules:

  • Network Security and Cryptography
  • Computer Systems and Networks
  • Data Structures and Algorithms
  • Web Security and Development
  • Artificial Intelligence Security

Training and Certifications

  • Google Cyber Security Certificate: Includes Linux, MySQL, and Python hands-on labs.
  • Microsoft Certified: Azure Security Engineer Associate (AZ-500): Focuses on implementing security controls, maintaining security posture, and managing identity, access, and threat protection in Azure environments.
  • CompTIA Security+ (SY0-601): Covers core cybersecurity skills, including threats, attacks, vulnerabilities, architecture and design, implementation, operations and incident response, and governance, risk, and compliance.
  • CompTIA Network+ (N10-008): Covers networking fundamentals, network architecture, and security protocols.
  • CompTIA A+ (EX0-005): Covers hardware and software fundamentals, troubleshooting, and customer support.
  • CompTIA Linux+ (LPI-101): Covers Linux system administration, networking, and security.
  • CompTIA CySA+ (CS0-002): Covers cybersecurity architecture, threat intelligence, and incident response.
  • CompTIA CASP+ (CAS-002): Covers advanced cybersecurity skills, including threat hunting, incident response, and digital forensics.
  • CompTIA CASP+ (CAS-002): Covers advanced cybersecurity skills, including threat hunting, incident response, and digital forensics.

Resume

You can add a brief summary and a download link for your resume here.

Download Resume

Blog

This section can display recent blog posts or link to an external blog.

Speaking Engagements & Publications

  • "The Importance of Risk Analysis in SMBs" - Presented at Local Cybersecurity Meetup
  • Guest Post on Security Blog: "5 Steps to a More Secure WordPress Site"
  • Research Paper: "Analyzing Phishing Attack Vectors in Remote Work Environments"

Now

Currently, I'm in my final year at St Mary's University, focusing on my cybersecurity thesis project which involves researching advanced persistent threats (APTs). I'm also actively practicing my penetration testing skills on Hack The Box and exploring cloud security practices on AWS.

Learning new defensive and offensive security techniques and contributing to open-source security tools are high on my priority list right now.

Contact

(+44) 07818719633

London, United Kingdom