Vaishnavi Varadarajan

Product Engineer

Stockholm, Stockholm, Sweden5 yrs 4 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Expert in vulnerability analysis and security testing.
  • Contributed to innovative ORAN feature testing.
  • Strong background in IIoT security challenges.
Stackforce AI infers this person is a Telecommunications Security Analyst with expertise in vulnerability management and IIoT security.

Contact

Skills

Core Skills

Vulnerability AnalysisThreat & Vulnerability Management

Other Skills

Tenable NessusDefensicsFuzzingFloodingVulnerability TestingNessusWiresharkFlooding and Robustness testingFuzzing and Fuzz driven testingVulnerability ScanningC++C (Programming Language)MatlabLabVIEWDigital Image Processing

Experience

5 yrs 4 mos
Total Experience
2 yrs 10 mos
Average Tenure
4 yrs 10 mos
Current Experience

Ericsson

Vulnerability Analysis Developer

Jul 2021Present · 4 yrs 10 mos · Stockholm · On-site

  • As a Vulnerability Analysis Developer in Ericsson, I work on securing Baseband and Radio products through quarterly vulnerability testing that includes scanning, fuzzing, flooding, and protocol‑level analysis using tools like Nessus, Defensics, and internal Ericsson frameworks. I also evaluate new security testing tools and methodologies to strengthen our automation and coverage. My work includes contributing to Ericsson’s first‑time ORAN feature testing and supporting research to improve Air Interface protocol testing. I collaborate closely with cross‑functional teams to refine testing strategies and enhance the overall security and reliability of Ericsson’s network solutions.
Tenable NessusDefensicsVulnerability AnalysisThreat & Vulnerability ManagementFuzzingFlooding

Rise research institutes of sweden

Master Thesis Student

Jan 2021Nov 2021 · 10 mos · Stockholm County, Sweden · Hybrid

  • Citation: V. Varadarajan, ‘Security Analysis of OPC UA in Automation Systems for IIoT’, Dissertation, 2022.
  • As a Master Thesis Student, I was involved in enhancing the use of OPC UA for IIoT. The goal of this project was to investigate the use case from ABB and the security challenges using OPC UA over TSN and propose new solutions to cover the security gaps and challenges for OPC UA over TSN.

College of engineering guindy, chennai

Research Internship

Nov 2018May 2019 · 6 mos · Chennai · Hybrid

  • Research Paper Title: Novel Physical Layer Security using Adaptive Modulation Scheme for Improved Confidentiality
  • The major contributions by this paper are as follows:
  • To enhance confidentiality and to minimise SER, even at low SNR, a novel adaptive modulation scheme has been
  • proposed.
  • The performance of the proposed scheme is evaluated with two types of attacker models. The effects of SNR and
  • phase estimation errors on SER have been analysed for certain guard intervals.
  • Citation:
  • Loganathan, Lavanya Dhamodhar, Ramaprabha Rengaraj, Gunaseelan Konganathan, and Vaishnavi Varatharajan.
  • ”Physical layer security using an adaptive modulation scheme for improved confidentiality.” IET Communications
  • 13, no. 20 (2019): 3383-3390.

Rockwell automation

Internship

Jul 2018Oct 2018 · 3 mos · Ghaziabad, India · On-site

  • As an Intern, I was a part of the testing of PLC Panel (Reliance Refinery in Jamnagar and ONGC Refinery in Nawagawn). I also have hands-on experience on how to work with software’s like FactoryTalk View Studio(for SCADA) and
  • Studio 5000(RsLogix)

Engineers india limited

Summer Internship

May 2018Jun 2018 · 1 mo · Greater Delhi Area

  • Detail study about Synchronous Digital Hierarchy(SDH) Technology conducting Cycle Time Analysis and suggested
  • improvements to increase efficiency was done.

Education

KTH Royal Institute of Technology

Master's degree — Communication Systems

Jan 2019Jan 2021

Indian Institute of Information Technology Design & Manufacturing Kancheepuram

Bachelor of Technology - BTech

Jan 2015Jan 2019

Delhi Public School Ghaziabad, Vasundhara

Apr 2001May 2014

Stackforce found 100+ more professionals with Vulnerability Analysis & Threat & Vulnerability Management

Explore similar profiles based on matching skills and experience