About Me
I am a cybersecurity researcher and practitioner with hands-on experience across offensive security, operating system security, wireless networks, and applied security engineering. My work focuses on identifying real-world vulnerabilities, understanding system internals, and designing security-first architectures.
I have worked on penetration testing engagements, operating system security research, malware analysis, and secure system design. My interests include Linux OS internals, container security, wireless attack surfaces, IoT threat modeling, and responsible vulnerability disclosure. I actively participate in CTFs, security research, and hands-on lab environments to sharpen practical skills.
Education & Background
Educational Qualifications
Degree: Bachelor of Technology (B.Tech)
Field of Study: Computer Science and Engineering (Cyber Security)
Institution: Amrita Vishwa Vidyapeetham, Coimbatore
Graduation Year: 2026 (Expected)
Coursework: Computer Networks, Network Security, Cryptography, Digital Forensics, Secure Coding, IoT, Operating Systems, Distributed Systems, Cloud Computing
Experience
Experience across security research, penetration testing, and applied cybersecurity through internships, academic projects, and independent research.
Work Experience
Job Title: Operating Systems Security Research Intern
Company: LG Soft India
Duration: Jun 2025 – Present
Key Responsibilities:
- Researching Linux OS security and container isolation mechanisms
- Designing and implementing lightweight container orchestration technology
- Applying security-first principles to system architecture
Achievements: Built secure container runtime components using Linux namespaces and cgroups
Job Title: VAPT Intern
Company: Bharat Electronics Limited (BEL)
Duration: May 2025 – Jun 2025
Key Responsibilities:
- Conducted internal web and network penetration testing
- Reported vulnerabilities and reduced attack surface
- Worked on STIG-based Windows server hardening automation
Achievements: Identified and helped remediate multiple high-risk attack vectors
Position: Malware Analyst (Independent Research)
Organization: Self-Research
Duration: Jun 2024 – Jul 2024
Focus Areas:
- Static and dynamic malware analysis
- Ransomware behavior and execution flow
- Reverse engineering fundamentals
Learnings: Practical understanding of malware internals and threat behavior
Core Competencies
Primary technical competencies aligned with practical cybersecurity work:
Offensive Security
- Penetration Testing
- Vulnerability Assessment
- Active Directory Attacks
- Exploit Development Basics
Wireless & Network Security
- Wi-Fi Attacks (WPA/WPA2)
- Network Reconnaissance
- Traffic Analysis
- IDS/IPS Concepts
OS & System Security
- Linux Internals
- Container Security
- Sandboxing & Isolation
- System Hardening
Malware & Research
- Malware Analysis
- Reverse Engineering
- Threat Modeling
- Responsible Disclosure
Technical Toolkit
Tools and platforms used across labs, research, and real-world testing:
Security Tooling
- Kali Linux, Parrot OS
- Metasploit, Burp Suite
- Nmap, Wireshark
- Aircrack-ng, Wifite
Development & Scripting
- C, C++, Python
- Bash Scripting
- Socket Programming
- Linux System Programming
Platforms
- TryHackMe, HackTheBox
- Custom AD Labs
- IoT Testbeds
- CTF Environments
Featured Posts
Selected technical write-ups, vulnerability disclosures, and security research posts published on LinkedIn.
You Use Docker, I Created One!
Built conorch, a lightweight, security-focused container orchestrator during the SECURE-IN internship, implementing namespaces, cgroups, filesystem isolation, networking, and Ubuntu rootfs automation with ~50 MB RAM usage. The project emphasized minimal overhead and strong isolation, delivering Docker-like functionality with a deliberate security-first design.
CERTIn-64284725
A government score-card portal exposed a full backend stack trace on its production login page, revealing internal paths, SQL queries, and framework details. This indicates a serious production hardening failure on a system handling sensitive citizen data. The issue was responsibly reported to CERT-In without public disclosure of technical details.
CEH Completion
Successfully completed the Certified Ethical Hacker (CEH) v13 certification from EC-Council, strengthening practical offensive security skills with a strong ethical foundation.
Signal-First Terminal Setup
Built a custom shell and tmux setup that surfaces real operational signal—active IP, exit-code visibility, and tmux session/window/pane context—without noise. Used daily for months, with frictionless mouse-based copy enabled, proving reliable for serious tmux-centric workflows.
General Awareness
Cybersecurity is discipline, not aesthetics—lock-screen leaks of OTPs, bank alerts, or messages turn users into the vulnerability without any exploit required.If sensitive notifications are visible, security has already failed at the most basic level.
Penetration Testing Internship — BEL
Completed a full-time Penetration Testing internship at Bharat Electronics Limited (NWCS), delivering VAPT on internal servers and building a Windows Server 2019 STIG automation covering 91 audit rules with >50% efficiency gain. Hands-on exposure to exploit analysis, secure reporting, system hardening, and data exfiltration controls strengthened practical offensive and defensive security skills.