Welcome...

|

Professional Experience

Practical experience spanning operating system security research, penetration testing, malware analysis, cybersecurity training, artificial intelligence, and web development through internships, research roles, and independent work.

OS Security Research Intern

LG Soft India

May 2025 – Present

  • Conducting operating system–level security research with focus on sandboxing.
  • Analyzing OS internals and isolation mechanisms for security weaknesses.
  • Contributing to system hardening and secure architecture discussions.

Junior Penetration Tester Intern

Bharat Electronics Limited (BEL)

May 2025 – Jun 2025

  • Executed network and application penetration testing engagements.
  • Performed security audits, configuration reviews, and system hardening.
  • Produced detailed vulnerability assessment and remediation reports.

Professional Certifications

Certified Ethical Hacker (CEHv13)

Issuer: EC-Council

Status: Active

Industry-recognized certification validating expertise in ethical hacking and penetration testing.

Ethical Hacking Essentials (EHE)

Issuer: EC-Council

Status: Active

Foundation-level certification in ethical hacking principles and methodologies.

Certified Chief Information Officer (CCIO)

Issuer: EC-Council

Status: Active

Executive-level certification in information security governance and risk management.

Areas of Interest & Research

Wireless Security Research

Focused research on Wi-Fi security including WPA/WPA2 handshake capture, rogue access points, deauthentication attacks, wireless reconnaissance, and protocol-level weaknesses.

Internet of Things (IoT) Security

Security of IoT ecosystems covering honeypots, smart home intrusion detection, device exposure analysis, and network-based attack detection in constrained environments.

Linux Operating System Security

Low-level Linux security including OS internals, sandboxing, container isolation, hardening techniques, and secure system design with a security-first mindset.

Ethical Hacking Methodologies

Structured penetration testing methodologies covering reconnaissance, exploitation, post-exploitation, reporting, and responsible disclosure aligned with real-world VAPT practices.