Cybersecurity Professional

Sugam
Dangal

Security Operations · Threat Intelligence · Penetration Testing

A detail-oriented cybersecurity enthusiast with hands-on experience in vulnerability assessment, penetration testing, and security operations. Currently working as a SOC & Cyber Threat Intelligence Analyst at Vairav Technologies.

SIEM Incident Response Threat Hunting Web App Security
Portrait of Sugam Dangal
scroll
01

About Me

I'm a passionate cybersecurity professional based in Kathmandu, Nepal, specializing in security operations, threat intelligence, and vulnerability research.

"Motivated to learn and grow in the field, with a collaborative mindset and a focus on delivering effective solutions."

With experience spanning SOC operations, independent security research on Intigriti's bug bounty platform, and a strong academic foundation from London Metropolitan University, I bring a well-rounded perspective to security challenges.

I work across the full security lifecycle — from proactive threat hunting and SIEM monitoring to incident response and detailed vulnerability reporting.

3+
Years Experience
10+
SIEM Platforms
4
Certifications
MSc
Cybersecurity
02

Experience

SOC & Cyber Threat Intelligence Analyst
Vairav Technologies
Kathmandu, Nepal
Current
Jun 2025 – Present
  • Monitor and analyze security alerts and incidents using SIEM tools to identify potential threats and vulnerabilities.
  • Use Logpoint, Microsoft Sentinel, Microsoft Defender, IBM QRadar, Google Cloud Security, Wazuh, ELK and Vairav CTMS for security monitoring.
  • Perform incident triage, root cause analysis and coordinate timely response to mitigate security incidents.
  • Create visualizations and dashboards to enhance visibility and reduce false positives.
  • Investigate latest threats and prepare security advisory reports.
  • Maintain and update MISP feed for better threat prevention.
  • Investigate and provide findings on latest Indicators of Compromise (IOCs).
  • Collaborate with cross-functional teams to strengthen security posture and improve response efficiency.
Security Researcher
Intigriti
Remote
Jan 2024 – Jun 2025
  • Conducted independent vulnerability assessments on various web applications, APIs, and networks to identify security flaws.
  • Exploited identified vulnerabilities, including OWASP Top 10, to demonstrate potential impact.
  • Collaborated with development teams to provide detailed reports, including proof-of-concept (PoC) and recommendations for remediation.
  • Utilized Burp Suite, OWASP ZAP, Wireshark and custom scripts to uncover security weaknesses.
  • Consistently stayed updated on the latest vulnerability trends, attack vectors, and security best practices.
SOC Analyst Intern
Vairav Technologies
Kathmandu, Nepal
Sep 2022 – Jan 2023
  • Installed and configured Wazuh SIEM for monitoring event logs.
  • Installed and configured ELK stack for log analytics and SIEM.
  • Monitored and analyzed security alerts and incidents using SIEM tools.
  • Assisted in the investigation and response to security incidents, including malware infections, phishing attempts, and unauthorized access.
  • Participated in threat intelligence gathering and analysis to stay updated on the latest cyber threats.
IT Administrator
Madan Bhandari Memorial College
Kathmandu, Nepal
Oct 2022 · Short-term
  • Managed and updated existing hardware and software systems to ensure optimal performance and compatibility.
  • Troubleshot LAN network issues, identified root causes, and provided effective remediation recommendations.
  • Implemented access control mechanisms to secure network and system resources.
  • Performed system hardening procedures to mitigate security vulnerabilities.
  • Monitored network performance and security, taking proactive measures to prevent potential issues.
03

Skills

Security Monitoring
Firewall Active Directory WAF Webserver Database Server Email Server CrowdStrike
Threat Hunting
IOC Investigation Credential Monitoring Dark Web Monitoring MISP MITRE ATT&CK
Network Security
Network Assessment Traffic Analysis Wireshark Reporting
Incident Response
Incident Investigation Root Cause Analysis Triage Containment
Web App Security
OWASP Top 10 Burp Suite OWASP ZAP POC Writing API Testing
SIEM Platforms
Logpoint Microsoft Sentinel Microsoft Defender IBM QRadar Google Cloud Security Wazuh ELK Vairav CTMS
04

Certifications

eJPTv2 · eLearnSecurity
Junior Penetration Tester
Network and web application penetration testing, covering enumeration, exploitation, and reporting.
CC · ISC²
Certified in Cybersecurity
Cybersecurity fundamentals, security principles, incident response, and best practices.
CyberOps · Cisco
CyberOps Associate
Security operations center workflows, threat analysis, and network intrusion analysis.
AWS Academy Graduate
Cloud Computing & Security
Cloud infrastructure fundamentals, AWS services, and cloud security principles.
05

Education

MSc IT in CyberSecurity
London Metropolitan University · Islington College
Feb 2024 – Present Kathmandu, Nepal
BSc (Hons) Networking & IT Security
London Metropolitan University · Islington College
Mar 2021 – Sep 2023 Kathmandu, Nepal
10+2 — Computer Science
United Academy
Jul 2018 – Mar 2020 Lalitpur, Nepal
06

Awards

🏆
AAA Scholarship 2024
Islington College — Academics, Attendance & Attitude
Scholarship awarded for 3rd Year BSc (Hons) Computer Networking & IT Security in recognition of outstanding academic performance, consistent attendance, and positive attitude.
07

Let's Connect

Open to new opportunities, collaborations, and conversations about cybersecurity. Whether it's a job opportunity, a research project, or just a chat about the latest threats — reach out.

Send a Message