Cyber Security Analyst @ eGuardian Lanka

Yasindu Nayanajith

|

Cyber Security Analyst at eGuardian Lanka Pvt Ltd, specializing in penetration testing, vulnerability assessment, and security compliance frameworks. Protecting digital assets with precision.

0 Tools Mastered
0+ Projects Done
0 Certifications
πŸ›‘οΈ
Scroll

Who I Am

Yasindu Nayanajith

Yasindu Nayanajith

Cyber Security Analyst Β· eGuardian Lanka Pvt Ltd

Kalutara, Sri Lanka
+94 715 587 560
yasindunayanajith2001@gmail.com

I'm a Cyber Security Analyst at eGuardian Lanka Pvt Ltd, currently pursuing a BSc (Hons) in Information Technology specializing in Cyber Security at SLIIT.

My expertise spans penetration testing, digital forensics, EDR/XDR technologies, and security compliance frameworks including ISO 27001, NIST CSF, GDPR, and PCI-DSS.

I continuously sharpen my skills on HackTheBox, TryHackMe, PortSwigger, and OverTheWire, and stay ahead of threats through ongoing certifications with CISCO, ESET, and ISC2.

Education

BSc (Hons) IT – Cyber Security

Sri Lanka Institute of Information Technology (SLIIT) Oct 2022 – Present

G.C.E (A/L) – Physical Science Stream

G/ Dharmasoka College, Ambalangoda 2021

G.C.E (O/L) – 9 A's

G/ Dharmasoka College, Ambalangoda 2017

Technical Arsenal

πŸ”

Core Security

  • Ethical Hacking & Penetration Testing
  • Digital Forensics
  • Web Security
  • Cryptography & Encryption
  • EDR, XDR, DLP Technologies
πŸ“‹

Compliance Frameworks

  • ISO 27001
  • NIST CSF
  • GDPR
  • PCI-DSS
  • HIPAA
πŸ’»

Programming

  • Python
  • Bash Scripting
  • JavaScript
  • PHP
  • C / C++ / SQL
πŸ› οΈ

Security Tools

  • BurpSuite & OWASP ZAP
  • Nmap & Nessus
  • Metasploit & Netcat
  • Wireshark
  • Feroxbuster / Gobuster / ffuf
πŸ”

Forensics & Recon

  • mmls, fls, icat
  • Binwalk
  • OpenSSL
  • Recon-ng
  • Curl
🌐

Learning Platforms

  • HackTheBox
  • TryHackMe
  • PortSwigger Web Academy
  • OverTheWire
  • LetsDefend & CISCO

Featured Work

πŸ”¬

Sample Penetration Testing Report

Conducted a full penetration test following industry-standard methodologies. Documented findings with CVSS scoring, attack vectors, and detailed remediation recommendations.

Metasploit Nmap BurpSuite
πŸ“‘

IoT & IoMT Penetration Testing Review

Researched and documented penetration testing methodologies specifically tailored for IoT and IoMT devices, identifying attack surfaces and mitigation strategies.

IoT Security Research Methodology
πŸ“

ISO 27001 Security Toolkit

Prepared a comprehensive toolkit for ISO 27001:2022 implementation including security awareness training program, risk assessment templates, and compliance documentation.

ISO 27001 Compliance Risk Management
πŸ›

Bug Bounty Research & Reporting

Conducted bug bounty research identifying and reporting real-world vulnerabilities. Applied responsible disclosure principles and produced professional vulnerability reports.

Bug Bounty Web Security OWASP
πŸ”‘

SHA-256 Performance Analysis

Comprehensive testing and performance analysis of SHA-256 cryptographic hash function implemented in Python. Benchmarked performance across different workloads.

Python Cryptography Analysis
🚨

Incident Response Plan

Designed a complete Incident Response Plan covering detection, containment, eradication, and recovery phases aligned with NIST guidelines.

NIST Incident Response Security Ops
βš›οΈ

Quantum Computing & Cybersecurity

In-depth research report analyzing quantum computing's potential impact on modern cybersecurity, cryptographic algorithms, and future defensive strategies.

Research Quantum Cryptography

Courses & Certifications

βœ… Completed

πŸ“§

Phishing Email Analysis

LetsDefend
βœ“
πŸ•ΈοΈ

Web Attack Investigator

LetsDefend
βœ“
πŸŽ“

Junior Cybersecurity Career Path

CISCO
βœ“
πŸ’»

Endpoint Security

CISCO
βœ“
πŸ†

ISC2 CC Self-Paced Training

ISC2
βœ“
πŸ›‘οΈ

What's New | B2B Offering 2026/Q1 Update Sales Crash Course

ESET
βœ“

⏳ In Progress

βš”οΈ

Ethical Hacker

CISCO
⏳
🌐

CCNA – Cisco Certified Network Associate

CISCO
⏳
πŸ…

CESP | Certified ESET B2B Sales Professional 2026

ESET
⏳
πŸ“š

Introduction to ESET B2B Sales Professional 2026

ESET
⏳
πŸ”

CESS | Certified ESET B2B Specialist 2026

ESET
⏳

Soft Skills

🧠 Ethical Mindset
⚑ Self-Motivation
🎯 Stress Management
πŸ”Ž Critical Thinking
πŸ’ͺ Hard Working
🀝 Teamwork
πŸ’¬ Communication Skills

Let's Connect

Ready to discuss an internship opportunity or collaborate? I'd love to hear from you.

I Know Who You Are

A demonstration of how much information a website can silently gather β€” no downloads, no plugins, no permissions asked.

Seriously. Don't.

root@yasindu-sec:~# profile_scan --target visitor
[+] Initiating passive reconnaissance...
[+] Fingerprinting target browser environment...
[+] Extracting device metadata...
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
⚠️ This is a passive, read-only demonstration. No data is stored or transmitted. This is what any website can silently collect.