$ cat about.md
Security Engineer | Specializing in Penetration Testing, Secure Application Deployment, and Enterprise Security Hardening
$ cat experience.log
- Spearheaded comprehensive security assessments yielding 25% reduction in enterprise attack surface through strategic identification of network vulnerabilities and Active Directory misconfigurations.
- Enhanced web security via OWASP-based testing with Burp Suite, increasing detection by 30%
- Executed sophisticated red team engagements achieving 100% of assessment objectives, enabling clients to remediate critical infrastructure vulnerabilities
- Implemented a local DNS server with DNSSEC, DOT, and DOH, reducing DNS query response time by 35.2% and enhancing network defense security and performance.
- Applied Moving target defense (MTD) strategies on 2 Ubuntu VM’s against DNS flooding attacks in an SDN environment.
- Engineered in extracting and analyzing forensic disk images from storage devices, utilizing tools such as dd, Autopsy and FTK.
- Conducted malware analysis on three diverse operating systems, facilitating the creation of a comprehensive dataset.
- Spearheaded bug identification and reporting initiatives for Windows 11 OS, driving a transformative 60% enhancement in system stability and reliability, elevating product quality standards.
- Pioneered comprehensive testing protocols for antivirus solutions, executing malware and viruses in controlled environments, resulting in a remarkable 35% improvement in threat detection efficacy and bolstering cybersecurity defenses.
- Championed the fortification of Microsoft Defender within the OS, culminating in a substantial 30% increase in malware detection and incident response rates, thereby ensuring strong protection against evolving cyber threats.
- Orchestrated thorough evaluation of network and port scanners, including Wireshark, Nessus, and Advanced IP Scanner, optimizing compatibility and functionality to meet stringent performance standards.
- Applied advanced analysis techniques to Windows event logs (security, system, application) and crash logs, unveiling software bugs and vulnerabilities, leading to a significant 20% reduction in system risks and enhancing overall system integrity.
- Executed successful RCE (Remote Code Execution) on Apache2 Struts, Drupal 7, and SMB servers, bolstering penetration testing expertise and fortifying system defenses against critical vulnerabilities.
- Enhanced security protocols with Nmap, Nessus, and Metasploit, driving a 40% surge in vulnerability detection and efficiency
- Revamped threat detection capabilities through thorough analysis of over 1000 logs with the ELK stack, resulting in a 50% increase in early threat detection and proactive risk mitigation.
$ echo education.txt
Florida Tech • Florida, USA
Amity University • Remote / Noida, India
Vel Tech R&D Institute of Science and Technology • Chennai, India
$ ls -la skills/
Programming Languages
Cybersecurity Tools
$ grep -r "CTF" achievements/
$ find . -name "projects"
▹ Analysis of popular industry-used Wi-Fi hacking tools, Aircrack-ng, Reaver, Wifite and Fern Wi-Fi Cracker
▹ A Biometric Privacy Analysis of Image Cloaking Methods against Face Recognition Algorithm
▹ Hosting a website and analyzing traffic in the TOR network
▹ Applied digital forensics on a fictional case study
▹ Re-creating hashdump plugin in Volatility - 3