As a Cybersecurity and Digital Forensics student, I am passionate about protecting against digital threats and uncovering the truth through digital investigations. My interests lie in various aspects of the field, including Cybersecurity, Digital Forensics, and Software Engineering. With a solid foundation in these areas, I am ready to make a meaningful impact on the industry and help keep our digital world secure. My ultimate goal is to become a leader in the field and leverage my skills to tackle complex cybersecurity and digital forensics challenges. Additionally, I'm an enthusiastic and detail-oriented individual who enjoys problem-solving and exploring new ideas. I firmly believe in building upon existing solutions and refining their underlying systems, rather than reinventing the wheel. It's similar to focusing on the bearings, chassis, and engine-block, rather than building the entire car from scratch.
Bachelor's in Cyber-Security and Digital-Forensics • Aug 2020 - Jun 2024
I'm pursuing a comprehensive undergraduate education in Cyber Security and Digital-Forensics, covering computer science, network security, digital forensics, cryptography, and risk management. My coursework has equipped me with a solid technical foundation and practical experience through hands-on projects.
InfoSec Engineer Intern • Dec 2023 - Present
As an Information Security Engineer Intern at Credo Technology Services, I've had the opportunity to dive deep into the ForgeRock Identity Platform, exploring its core features and functionalities. I've integrated OAuth, SAML, and OIDC flows to ensure secure authentication and authorization mechanisms with different applications. Currently, I'm working on Authentication trees, also known as Intelligent Authentication, which provides a fine-grained authentication experience by allowing multiple paths and decision points throughout the authentication flow.
Research Assistant• Dec 2022 - May 2024
I embarked on my journey at Protect Lab as a research assistant, initially contributing to the development of Aniketos. I also crafted a website that enriched Protect Lab's digital presence. During my tenure, I oversaw multiple projects. Additionally, I researched ZTNA, the QUIC network protocol, access control, and identity management, and developed SecT (Secure Transmission - ZTNA solution).
Cyber Security Engineer • Jul 2023 - Feb 2024
I began as a cybersecurity intern at LogicFinder, contributing to an advanced security product leveraging AI and ML to combat cyberattacks. I focused on enhancing system capabilities in three key areas: network traffic anomaly detection, DNS exfiltration detection, and encrypted payload detection. This experience deepened my appreciation for the intersection of AI, ML, and cybersecurity. Right now, I am working as a Cyber Security Engineer at LogicFinder and am currently focused on the detection of various cyber security attacks.
Cyber Security Intern • Jul 2023 - Aug 2023
During my internship at Nayatel, I gained hands-on experience in diverse areas of systems, security, and penetration testing. I honed my skills in configuring and securing network protocols, explored SIEM solutions, developed web applications to enhance DNS server functionality, and deepened my knowledge of Linux administration, scripting, and effective teamwork. This internship provided invaluable insights into real-world IT operations and cybersecurity practices, fueling my passion for continuous professional growth.
Software Engineer Intern • Jul 2022 - Oct 2022
At Quest Lab, I gained valuable experience applying my software engineering knowledge and technical skills on cutting-edge projects. Working alongside experienced professionals, I contributed to software development, code testing, debugging, and system design and implementation. Notable projects included a real-time data scraping web application for Amazon, eBay, Daraz, and Flipkart, and a song downloader app that retrieves all songs by a given singer.
Threat Hunting Intelligence and Research Intern • Jul 2022 - Oct 2022
At Thincs Corp, I garnered valuable experience working on cybersecurity and information security projects. Collaborating with seasoned professionals, I played a role in safeguarding critical systems and data. My responsibilities encompassed security assessments, network activity monitoring, SEIM solution setup, such as Splunk, involvement in incident response, and malware analysis. The highlight of my internship was setting up an automated malware analysis lab, Cuckoo.
Teaching Assistant and Lab Demostrator• Feb 2022 - Jun 2024
I have served as a Teaching Assistant for the following courses: Vulnerability Assessment & Reverse Engineering, Information Security, Networks and Cyber Security 1, Programming Fundamentals, and Object Oriented Programming. Additionally, I held the role of Lab Demonstrator for Programming Fundamentals and Object Oriented Programming.
Bypassing python payloads through Microsoft defender and SmartScreen upto Windows 11 22H2.
Python, Cython, NuitkaA Ransomware that employs both symmetric and asymmetric encryption techniques to encrypt a victim's entire system, including external disks. The symmetric encryption algorithm is used to encrypt the victim's files and data, while the asymmetric encryption algorithm is used to encrypt the symmetric key.
Python, Cryptography, HackingThe sorting visualizer developed in ReactJS is a web application that provides a visual representation of different sorting algorithms. The application allows users to select from a variety of sorting algorithms such as bubble sort, quick sort, insertion sort, and selection sort. Once a sorting algorithm is selected, the user can input an array of values to be sorted. The application then displays a visual representation of the sorting process, showing how the algorithm rearranges the array in real-time.
ReactJSThe word search application developed in C# is a tool that allows users to search for specific words in a text document. The application uses three different search algorithms: Brute Force, Knuth-Morris-Pratt, and Rabbin Karp, to find the specified word in the document. The user can select which algorithm to use, depending on the size of the document and the expected time required for the search.
One of the unique features of this application is its integration with Notepad++. This integration allows users to search for a word directly from Notepad++ without having to switch to the search application. This feature provides a seamless experience for users who prefer to work within Notepad++.
A complete Peer 2 Peer coummication application by applying the concepts of Trusted Third Party and using different cryptographic algorithms like Diffie Hellman Key-Exchange, RSA, AES
Python, Tkinter, MongoDB, Socket ProgrammingCandy Crush, a popular match-3 puzzle game, developed in Assembly 8086 for the PC platform with low-level programming techniques.
Assembly LanguageHamari Dukaan is a comprehensive, secure shopping app that offers an intuitive user experience with the convenience of Google login. It utilizes MERN Stack for the client panel and Python tkinter for the admin panel, ensuring a seamless and reliable experience for both customers and administrators.
MERN Stack, Python, TkinterDear , Thank you so much for the visit. I would love an opportunity to work with you on your next project.
P.S. I am not logging these IP addresses. It is at the client side. You can check all the requests in the network tab.
Feel free to reach out to me with any questions or inquiries. I'd be happy to connect and discuss how I can help.