Akash Kumar Bhagat
About Akash Kumar Bhagat
Akash Kumar Bhagat is a Cyber Security Analyst at Gradient Cyber, where he has worked for eight months. He holds a Bachelor of Commerce degree and is certified as an Ethical Hacker and in Cybersecurity, actively engaging in network monitoring and incident investigation.
Work at Gradient Cyber
Akash Kumar Bhagat has been employed at Gradient Cyber as a Cyber Security Analyst since 2024. In this role, he collaborates with senior analysts to investigate and mitigate security incidents. His responsibilities include monitoring and analyzing network traffic to identify potential security threats. He also generates detailed reports on suspicious activities and communicates findings to stakeholders, contributing to the overall security posture of the organization.
Education and Expertise
Akash Kumar Bhagat completed his Bachelor of Commerce (BCom) in Accounting and Finance at Jagannath Barooah College from 2017 to 2020. He also achieved High Secondary Schooling (XII) from Assam Rifles Public School, Jorhat, in 2017, and Secondary Schooling (X) from Army Public School (APS) in 2015. He holds certifications as a Certified Ethical Hacker (CEHv12) and (ISC)² Certified in Cybersecurity (CC). Currently, he is preparing for the Practical Java Programming Test (PJPT) certification.
Background
Akash Kumar Bhagat has a solid educational foundation in commerce and cybersecurity. His early education included secondary schooling at Army Public School and high secondary schooling at Assam Rifles Public School. His academic journey continued at Jagannath Barooah College, where he focused on Accounting and Finance. This background has equipped him with analytical skills relevant to his current role in cybersecurity.
Professional Skills
In his role as a Cyber Security Analyst, Akash Kumar Bhagat actively engages in monitoring and analyzing network traffic to identify potential security threats. He collaborates with senior analysts to address security incidents effectively. His ability to generate detailed reports on suspicious activities and communicate findings to stakeholders demonstrates his proficiency in cybersecurity practices and incident response.