$ cat about.md
Security Engineer | Specializing in Penetration Testing, Secure Application Deployment, and Enterprise Security Hardening
$ cat experience.log
- Spearheaded comprehensive security assessments yielding 25% reduction in enterprise attack surface through strategic identification of network vulnerabilities and Active Directory misconfigurations.
- Enhanced web security via OWASP-based testing with Burp Suite, increasing detection by 30%
- Executed sophisticated red team engagements achieving 100% of assessment objectives, enabling clients to remediate critical infrastructure vulnerabilities
- Implemented a local DNS server with DNSSEC, DOT, and DOH, reducing DNS query response time by 35.2% and enhancing network defense security and performance.
- Applied Moving target defense (MTD) strategies on 2 Ubuntu VM's against DNS flooding attacks in an SDN environment.
- Engineered in extracting and analyzing forensic disk images from storage devices, utilizing tools such as dd, Autopsy and FTK.
- Conducted malware analysis on three diverse operating systems, facilitating the creation of a comprehensive dataset.
- Spearheaded bug identification and reporting initiatives for Windows 11 OS, driving a transformative 60% enhancement in system stability and reliability, elevating product quality standards.
- Pioneered comprehensive testing protocols for antivirus solutions, executing malware and viruses in controlled environments, resulting in a remarkable 35% improvement in threat detection efficacy and bolstering cybersecurity defenses.
- Championed the fortification of Microsoft Defender within the OS, culminating in a substantial 30% increase in malware detection and incident response rates, thereby ensuring strong protection against evolving cyber threats.
- Orchestrated thorough evaluation of network and port scanners, including Wireshark, Nessus, and Advanced IP Scanner, optimizing compatibility and functionality to meet stringent performance standards.
- Applied advanced analysis techniques to Windows event logs (security, system, application) and crash logs, unveiling software bugs and vulnerabilities, leading to a significant 20% reduction in system risks and enhancing overall system integrity.
- Executed successful RCE (Remote Code Execution) on Apache2 Struts, Drupal 7, and SMB servers, bolstering penetration testing expertise and fortifying system defenses against critical vulnerabilities.
- Enhanced security protocols with Nmap, Nessus, and Metasploit, driving a 40% surge in vulnerability detection and efficiency
- Revamped threat detection capabilities through thorough analysis of over 1000 logs with the ELK stack, resulting in a 50% increase in early threat detection and proactive risk mitigation.
$ echo education.txt
Florida Tech • Florida, USA
Amity University • Remote / Noida, India
Vel Tech R&D Institute of Science and Technology • Chennai, India
$ ls -la skills/
Programming Languages
Cybersecurity Tools
$ locate certifications
$ grep -r "CTF" achievements/
$ find . -name "projects"
▹ Analysis of popular industry-used Wi-Fi hacking tools, Aircrack-ng, Reaver, Wifite and Fern Wi-Fi Cracker
▹ A Biometric Privacy Analysis of Image Cloaking Methods against Face Recognition Algorithm
▹ Hosting a website and analyzing traffic in the TOR network
▹ Applied digital forensics on a fictional case study
▹ Re-creating hashdump plugin in Volatility - 3
$ vim publications/research_paper.tex
Valencia, Spain • March 3-5, 2025
Simulated learning, incorporating automated tools, generated quizzes, and interactive tutorials, represents a transformative approach to cybersecurity education for undergraduate and graduate programs. This paper aims to highlight the psychological and educational benefits of these tools in enhancing student performance while reducing anxiety associated with high-stakes learning environments.