Iβm a passionate Cybersecurity Professional with a strong focus on Security Operations, Threat Hunting, Incident Response, Vulnerability Management, and Cloud Security.
I have hands-on experience with Kali Linux, Metasploit, Splunk, Microsoft Sentinel, Defender, CrowdStrike, Nessus, Qualys, and Rapid 7.
I enjoy solving complex security challenges, building detection tools, and sharing my knowledge through writeups.
- Master of Science in Cybersecurity of Networks
University of New Haven - Dean Scholarship Recipient β’ TCOE Outstanding Service Award in Cybersecurity & Networks - Bachelor of Engineering in Information Science and Engineering
Visvesvaraya Technological University
Blockchain Security Engineer | Nov 2025 β Present
- Owned end-to-end security for a Bitcoin-native credit line product spanning smart contracts, mobile apps, backend APIs, and cloud infrastructure across 3 production environments.
- Audited smart contracts and remediated 10+ critical vulnerabilities β reentrancy flaws, logic errors, and access control bypasses β eliminating high-severity exploit paths before launch.
- Designed and deployed Wazuh SIEM integrated with GCP, onboarding 25+ log sources across firewall, endpoint, and cloud layers to achieve full-stack network visibility.
- Hardened GCP networking with least-privilege IAM, ACLs, and DMZ architecture aligned with CIS Controls v8 and NIST CSF; measurably reduced attack surface across all 3 environments.
- Conducted mobile penetration testing on the Surge Credit app (Kali Linux, Genymotion, Metasploit, Burp Suite, OWASP MAS); uncovered and remediated auth bypass, API abuse, and data leakage risks.
- Led secure code reviews and GitHub Advanced Security scans (Semgrep SAST, Gitleaks secret detection); resolved 20+ exposed API keys and hardcoded secrets before they reached production.
- Built STRIDE/PASTA threat models via OWASP Threat Dragon across blockchain, mobile, backend, and cloud layers; authored operational runbooks enabling 24x7 SOC coverage.
- Evaluated 50+ threat feeds, defined false positive reduction strategies, and implemented RAG pipelines + MCP agents enabling analysts to query threat intelligence via natural language.
- Supported GDPR, CCPA/CPRA, and FinCEN compliance requirements across the platform.
Cybersecurity Analyst | Jun 2024 β Oct 2025
- Built Python-driven CI/CD security pipeline integrations combining SAST, DAST, and dependency scanning tools, reducing exploitable vulnerabilities reaching production by 40%.
- Automated log collection, SIEM ingestion, and compliance reporting workflows to satisfy SOC 2 audit requirements, reducing manual evidence collection time.
- Collaborated with engineering teams to embed vulnerability management into CI/CD delivery pipelines and change management, lowering mean-time-to-remediation for critical findings.
- Assisted in incident response exercises and troubleshooting misconfigured systems impacting logging and monitoring.
Cybersecurity Analyst | Sep 2024 β Jun 2025
- Built and tuned Splunk dashboards with optimized log parsing and correlation rules, improving anomaly detection and reducing false positive volume.
- Spearheaded STRIDE threat modeling for Continuous Glucose Monitoring (CGM) mobile apps and cloud-backend telemetry, identifying 15+ high-risk attack entry points.
- Automated SIEM log ingestion and compliance reporting workflows, eliminating hours of manual evidence collection per SOC 2 audit cycle.
- Built and tuned Splunk dashboards with optimized log parsing and correlation rules, reducing false positive volume across multi-source pipelines and improving detection accuracy.
- Mapped all findings to MITRE ATT&CK TTPs and triaged IOCs via structured workflows, cutting mean investigation time by 30% and accelerating analyst response.
- Analyzed Nessus and Qualys scanner outputs; briefed leadership on security posture and guided engineering on CVSS-based remediation priority for medical device integrations.
- Executed endpoint containment using CrowdStrike and Microsoft Defender EDR, reducing attacker dwell time and halting lateral escalation across 200+ endpoints.
- Investigated lateral movement, BGP anomalies, and TCP/UDP-layer threats via Wireshark packet analysis; ensured HIPAA-aligned logging practices.
- Assisted in incident response exercises and resolved misconfigured systems impacting logging and monitoring visibility, strengthening overall detection posture.
Cybersecurity Analyst Internship | Oct 2022 β Jan 2023
- Performed breach analysis and mapped mitigations to NIST CSF and ISO 27001 controls; authored incident response playbooks and tabletop simulation reports adopted by the operations team.
- Conducted third-party risk assessments and vendor security reviews.
- Analyzed packet captures using Wireshark to identify lateral movement and suspicious DNS queries and attack paths; submitted structured IOC reports to the threat intelligence pipeline.
- Researched emerging threat actor TTPs and mapped them to MITRE ATT&CK Framework and Lockheed Kill Chain to support threat data labelling and ML model training.
Delivery Consultant | Aug 2021 β Jul 2022
- Conducted security testing and ensured HIPAA compliance of EHR systems.
- Performed security testing (regression, UAT, edge-case) to ensure EHR platform compliance with HIPAA.
- Coordinated configuration and patch management activities, reducing misconfiguration incidents.
- Supported go-live and post-deployment triage, resolving 90% of critical issues within 24 hours.
- Led root-cause analysis and SQL fixes to improve build stability to 98%.
- Collaborated with technical support to resolve production network and system incidents.
Software Engineer Intern | Aug 2029 β Jul 2021
- Implemented API rate limiting and input validation mechanisms, improving application security and reducing exposure to common web threats including injection attacks and unauthorized requests.
- Developed and maintained responsive web application components using HTML, CSS, JavaScript, and XAMPP with MySQL databases and REST APIs, supporting dynamic application functionality.
- Configured DNS records and domain settings for web application deployment, supporting reliable access and improving domain resolution and service availability.
- Assisted in cloud-based application deployment and environment configuration, supporting development and testing workflows for multiple web application modules.
- Conducted manual and regression testing across multiple release cycles, identifying critical defects prior to deployment and improving overall application stability.
- HashiCorp Certified: Terraform Associate
- Google Cybersecurity Professional Certificate V2
- Fortinet Certified Fundamentals Cybersecurity
- Architecting with Google Compute Engine
-
Fresh Connections Grocery Chain Networks
Designed a secure, high-availability network using OSPF, DMZ, ASA Firewalls, IDS/IPS, VPNs, VLANs, and AI-based threat detection, improving uptime by 30%. -
Hypervisor-Based Secure Windows Environment Simulation
Created and hardened a multi-tiered Windows environment with domain policies, WSUS, IIS, PowerShell, and NTFS security. -
Simulated Campus Network Penetration Testing
Performed penetration testing with tools like Metasploit, Burp Suite, Kali Linux, exploiting SQL injection, XSS, and CSRF vulnerabilities. -
IntelliHome IoT-Based Smart Living Automation
Architected an IoT smart home system that increased energy efficiency by 30% and reduced energy costs by 25%. -
Securing Cloud Infrastructure with AWS IAM
Developed scalable AWS IAM architecture for secure intern onboarding under least-privilege principles.
- Just have to deal with it
- The Course Awakens
- Shield Apprentice
- Skilled Navigator
- Terminated!
- Metasploitable
- Pentesting Principles
- Blue
- Burp'ed
- Networking Nerd
- World Wide Web
- Webbed
- cat linux.txt
- Sword Apprentice
- Cyber Ready
- Calculated Risk
- Introduction to Security Engineering
