▼ Scroll to explore
> ABOUT_ME
I'm a dedicated Cybersecurity student and enthusiast specializing in Defensive Operations and Infrastructure Hardening. I bridge the gap between core IT administration and proactive threat mitigation. My methodology focuses on Cybersecurity Frameworks, leveraging automation and deep-packet analysis to secure organizational assets.
Career Objective
Currently seeking an entry-level SOC Analyst or Cybersecurity role where I can apply my technical agility and analytical mindset to protect critical data and respond to emerging threats in real-time.
B.E. — Computer Science & Cybersecurity Engineering
Focused on architecting Secure-by-Design systems and defending digital infrastructure. Expert in bridging core software engineering with proactive threat mitigation, vulnerability assessment, and robust network defense.
> SKILLS
Strategically fortifying hybrid environments by merging core engineering with global security frameworks. Deploying advanced toolsets for vulnerability management, network orchestration, and proactive threat detection.
Core Skills
- NetworkingTCP/IP, OSI, IP Addressing, Subnetting, Firewall, VPN
- Scripting LanguagePython, Bash, PowerShell
- Network Security MonitoringWireshark, Zeek, Suricata / Snort, Security Onion
- Threat DetectionLog Monitoring & Triage, SIEM (Splunk, ELK, Microsoft Sentinel), XDR (Wazuh)
- Incident ResponseIRP, Forensics, Playbooks, Tabletop Exercises
- Identity ManagementActive Directory, GPO, MFA, SSO
- Vulnerability ManagementNessus, Burp Suite, Nmap, Hardening
- FrameworksNIST (CSF), ISO 27001, MITRE ATT&CK®, OWASP Top 10
Foundational Skills
- Programming LanguagePython, C (Basics)
- Systems & InfrastructureLinux (Ubuntu, Kali), Windows & Linux Server
- Cloud & VirtualizationAWS, Azure, VMware
- Deployment Tools & VCSGit, GitHub, Docker
- Database ManagementMySQL, PostgreSQL
- IT SupportHardware Maintenance, Remote Desktop (RDP), Troubleshooting
- Web DevelopmentHTML, CSS (Basics), JavaScript (Basics)
Soft Skills
- CommunicationRelaying risk to stakeholders and collaborating with cross-functional teams.
- TeamworkCollaborating across departments to implement security measures.
- Problem SolvingAnalyzing complex issues and developing effective solutions.
- AdaptabilityRapid learning of zero-day exploits and emerging attack vectors.
- Time ManagementPrioritizing tasks during high-pressure incidents and managing multiple projects.
> PROJECTS
A collection of controlled environments and security implementations designed to stress-test defensive architectures and validate mitigation strategies.
CyberSecurity_Lab_Setup
A comprehensive home lab environment simulating real-world attack scenarios. Integrated tools for network monitoring, vulnerability assessment, and incident response to validate defensive strategies and enhance practical skills.
> CERTIFICATIONS
In the rapidly evolving landscape of cybersecurity, staying current is a requirement. I actively pursue rigorous certifications to sharpen my defensive skills and stay ahead of emerging threat vectors.
> EXPERIENCE
Real-world security engagement — applying offensive and defensive techniques in a structured, production-adjacent environment.
- Executed real-world cybersecurity tasks across offensive and defensive domains, contributing to live security projects throughout the internship period.
- Demonstrated exceptional analytical thinking and professionalism — recognized as Best Performer out of the intern cohort by Elevate Labs leadership.
- Applied hands-on skills in threat analysis, vulnerability identification, and security tooling within a structured, production-adjacent environment.
- Operated under the Skill India / MSME Ministry of India framework — internship recognized at a national programme level.