Hi, my name is

Jonathan Tharian Zachariah.

I build things for the secure web.

I am a passionate cybersecurity graduate specializing in vulnerability assessment, penetration testing, and defensive strategies.

01. About Me

Hello! I'm Jonathan, a cybersecurity enthusiast based in Kerala, India. I enjoy exploring the depths of the internet and securing systems against malicious threats.

My journey started with a Master of Computer Applications, where I discovered my passion for Red Teaming and SOC Analysis. I have honed my skills in tools like Metasploit, Burp Suite, and Splunk.

I recently worked as a Consultant-ASD Operations at RM Education Solutions, ensuring application stability and security.

02. Skills & Expertise

Penetration Testing

Vulnerability Assessment, Metasploit Framework, Burp Suite, OWASP Top 10.

SOC & Defense

SIEM (Splunk), Incident Response, Log Analysis, Threat Hunting.

Networking & OS

Nmap, Wireshark, Windows, Kali Linux, Bash Scripting.

Programming

Python (Basics), Bash.

03. Projects

SIEM Lab using Splunk

Built a SIEM lab using Splunk by installing and configuring the Universal Forwarder to collect Windows Event Logs. Forwarded logs to Splunk Enterprise for analysis and threat detection.

  • Splunk
  • Windows Event Logs
  • SIEM

Web Application Vulnerability Assessment

Performed comprehensive vulnerability assessments on web applications, identifying critical issues like XSS and SQL Injection. Documented findings with remediation strategies.

  • Burp Suite
  • OWASP
  • Vulnerability Assessment

04. Experience & Education

May 2025 - Dec 2025

Consultant-ASD Operations

RM Education Solutions India Pvt Ltd

Supported Application Support & Development operations. Assisted in operational tasks ensuring business continuity.

Aug 2022 - Sep 2025

Master of Computer Applications

Mar Thoma Institute of Information Technology

Specialized in Computer Applications.

Oct 2024 - Feb 2025

Certified Penetration Tester

Red Team Academy

05. Services

Vulnerability Assessment

Identifying and classifying security loopholes in your digital assets.

Penetration Testing

Simulating cyberattacks to evaluate the security of your system.

Security Auditing

Comprehensive review of your organization's adherence to regulatory guidelines.

06. Get In Touch

I am currently looking for new opportunities in the cybersecurity field. Whether you have a question or just want to say hi, I'll try my best to get back to you!

Say Hello