Welcome...
|
Professional Experience
Practical experience spanning operating system security research, penetration testing, malware analysis, cybersecurity training, artificial intelligence, and web development through internships, research roles, and independent work.
OS Security Research Intern
LG Soft India
May 2025 – Present
- Conducting operating system–level security research with focus on sandboxing.
- Analyzing OS internals and isolation mechanisms for security weaknesses.
- Contributing to system hardening and secure architecture discussions.
Junior Penetration Tester Intern
Bharat Electronics Limited (BEL)
May 2025 – Jun 2025
- Executed network and application penetration testing engagements.
- Performed security audits, configuration reviews, and system hardening.
- Produced detailed vulnerability assessment and remediation reports.
Featured Projects
Selected projects demonstrating hands-on work in hardware security, IoT defense systems, and wireless network security research.
Data Diode
Description: Hardware-enforced one-way communication system designed as an ultimate firewall to prevent data exfiltration even under full system compromise.
Tools / Technologies: RS-232, Embedded Hardware, Linux, Secure System Design
Key Outcomes: Implemented unidirectional data flow, eliminated reverse-channel attacks, and enforced physical-layer security guarantees.
Context: Final Year Project – ongoing research inspired by industrial-grade secure architectures.
IoT-Based Smart Home Intrusion Detection System
Description: Honeypot-driven intrusion detection system for smart home environments to identify, redirect, and analyze malicious network activity.
Tools / Technologies: Raspberry Pi, iptables, Virtual AP, DHCP, Linux Networking
Key Outcomes: Detection of port scans, redirection of attackers to decoy services, and real-time traffic monitoring for threat analysis.
Deliverable: Detailed technical report documenting architecture and attack simulations.
Links:
WiFiSnipe
Description: Automated wireless network security testing tool designed to simplify Wi-Fi penetration testing workflows.
Tools / Technologies: Aircrack-ng, Wifite, Bash, Kali Linux
Key Outcomes: Automated scanning of nearby networks, WPA/WPA2 handshake capture, and targeted wireless jamming capabilities.
Links:
Professional Certifications
Certified Ethical Hacker (CEHv13)
Issuer: EC-Council
Status: Active
Industry-recognized certification validating expertise in ethical hacking and penetration testing.
Ethical Hacking Essentials (EHE)
Issuer: EC-Council
Status: Active
Foundation-level certification in ethical hacking principles and methodologies.
Certified Chief Information Officer (CCIO)
Issuer: EC-Council
Status: Active
Executive-level certification in information security governance and risk management.
Areas of Interest & Research
Wireless Security Research
Focused research on Wi-Fi security including WPA/WPA2 handshake capture, rogue access points, deauthentication attacks, wireless reconnaissance, and protocol-level weaknesses.
Internet of Things (IoT) Security
Security of IoT ecosystems covering honeypots, smart home intrusion detection, device exposure analysis, and network-based attack detection in constrained environments.
Linux Operating System Security
Low-level Linux security including OS internals, sandboxing, container isolation, hardening techniques, and secure system design with a security-first mindset.
Ethical Hacking Methodologies
Structured penetration testing methodologies covering reconnaissance, exploitation, post-exploitation, reporting, and responsible disclosure aligned with real-world VAPT practices.