Manoj Kumar Chollangi:
Lead Cybersecurity Engineer

Explore My Portfolio

My Projects

Showcasing my cybersecurity skills through various completed projects.

A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
Security Operations

Administration and monitoring of security operations effectively executed.

A padlock sits atop a stack of credit cards on a keyboard, with a bluish hue and digital streaks in the background, suggesting themes of digital security and privacy.
A padlock sits atop a stack of credit cards on a keyboard, with a bluish hue and digital streaks in the background, suggesting themes of digital security and privacy.
A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
Vulnerability Management

Identifying and managing vulnerabilities to enhance security posture.

Cybersecurity Skills

Showcasing my expertise in security operations, vulnerability management, and reporting.

Focused on enhancing cybersecurity measures.

Portfolio

Professional Experience

Cognizant Technology Solutions

Jult 2021 - Present

Responsible for security operations administration and monitoring incidents and vulnerabilities effectively.

A hand holds a smartphone displaying a cryptocurrency portfolio with various assets including Decentraland, Ethereum, Bitcoin, Algorand, and Polygon. The balance for each asset is shown alongside icons representing each cryptocurrency.
A hand holds a smartphone displaying a cryptocurrency portfolio with various assets including Decentraland, Ethereum, Bitcoin, Algorand, and Polygon. The balance for each asset is shown alongside icons representing each cryptocurrency.

About Manoj Kumar Chollangi

Cyber Security Professional over 3.5 years of experience in Security Operations Center(SOC) leveraging advanced security technologies and platforms, including LogRhythm SIEM, Cortex XDR, XSIAM, Darktrace, Cisco Prime, Infoblox, Qualys VM and Delinea Privilege Manager. expertise in incident triage, alert correlation, Incident response and vulnerability assessment using Qualys. Skilled in gathering, analyzing, and reporting threat intelligence and Security advisories to drive effective remediation efforts. Proven track record in optimizing defense strategies and enhancing Cyber Security posture through strategic analysis and proactive threat management

A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.
A person is typing on a MacBook Pro, viewing a website titled 'Personalize your portfolio.' The webpage displays three sections related to investing, each with different images and text. The laptop is on a grey table with a dark sofa and indoor plants in the background.
A person is typing on a MacBook Pro, viewing a website titled 'Personalize your portfolio.' The webpage displays three sections related to investing, each with different images and text. The laptop is on a grey table with a dark sofa and indoor plants in the background.

My Cybersecurity Expertise

Explore my skills in security operations, vulnerability management, and comprehensive reporting, Please Feel free to contact me via linkedIn