JENCY A

Untitled design-4-fotor-20250415115641

JENCY A

I am deeply passionate about the field of cybersecurity. With hands-on experience in penetration testing and network security

About Me

My name is Jency A, and I am deeply passionate about the field of cybersecurity. With hands-on experience in penetration testing and network security, I have developed a strong foundation in identifying vulnerabilities and implementing robust security measures.
I am currently pursuing my Bachelor’s degree at Karunya Institute of Technology and Sciences, which has equipped me with both theoretical knowledge and practical skills in cybersecurity.
Throughout my academic journey, I have actively engaged in internships and certifications to stay up-to-date with the latest advancements in the field. I have completed training in Ethical Hacking, Cybersecurity, and Web Application Security, and I hold certifications in Penetration Testing, OWASP Top 10 Security Threats, and Cryptography, among others.
Currently, I am working as a Cybersecurity Analyst Trainee at BCBuzz Technologies, where I am gaining valuable experience in network security auditing, vulnerability assessment, and ethical hacking. I am proficient in tools like Metasploit, Burp Suite, and Nmap, and I have a strong understanding of network protocols, firewall configurations, and security frameworks.
I am committed to continuous learning and professional growth in cybersecurity. My goal is to contribute to creating a safer digital environment through innovation, collaboration, and proactive security measures.
I believe that by staying informed about emerging threats and evolving security technologies, I can make a meaningful impact in the ever-changing cybersecurity landscape.

Audit Experience​


Web App Audit

34


Network Audit

34


Mobile App Audit

34


IOT Audit

34


Cloud Audit

34


AI & LLM Audit

34

Professional Qualifications

S.NOCERTIFICATION NAMEORGANIZATION NAMECOMPLETION DATE
1APISEC Certified PractitionerAPISEC UniversityApril 22, 2025
2Securing API ServersAPISEC UniversityApril 22, 2025
3OWASP API Security Top 10APISEC UniversityApril 22, 2025
4API AuthenticationAPISEC UniversityApril 22, 2025
5API Security Fundamentals '25APISEC UniversityApril 21, 2025
6API Documentation Best PracticesAPISEC UniversityApril 15, 2025
7Introduction to Hacking MethodologySimplyCyberMarch 15, 2025
8Understanding the OWASP® Top 10 Security Threats (SKF100)The Linux FoundationJanuary 05, 2025
9Practical Web Application Security and Testing The Taggart InstituteJanuary 04, 2025
10Creating with GitTTIDecember 21, 2024
11Pen testingIT MasterDecember 18, 2024
12CryptographyIT MasterDecember 10, 2024
13Introduction of CybersecurityCisco Network AcademyDecember 09, 2024
14Networking BasicsCisco Network AcademyDecember 07, 2024
15Red Hat System Administration II ( RH134 )RedHat AcademyJuly 14, 2024
16Introduction to MongoDBMongoDBJuly 11, 2024
17Google CybersecurityGoogleMarch 23, 2024

EdTech Contribution​