🔐 My Cybersecurity Portfolio Welcome to my cybersecurity portfolio a showcase of my projects and experiences from earning the EC-Council Certified Ethical Hacker (CEH) certification and completing a Master's in Information Systems Security.
🎯 Core Competencies Security Programming & Automation (Python, Bash, SQL)
Incident Detection & Response (Suricata, Chronicle, Splunk)
Cloud & Network Security (OpenStack, Snort, TCP/IP)
Vulnerability Assessment & Cryptography (RSA, Threat Modeling)
Operating System & Kernel Security (Linux, Syzkaller)
Blockchain & IoT Security
Security Frameworks: NIST RMF, CIS Controls, ISO 27001, CIA Triad
Additionally, it has paved the way for me to pursue one of the entry-level following roles:
- Cybersecurity Analyst = Security Analyst
- SOC Analyst
- Information Security Analyst
- IT Security Analyst
- Cyber Defense Analyst
Skills/Knowledge Gained 1 Security Audit INFOSEC, NIST RMF, CISSP, CIA Triad, Incident Response Playbooks 2 Network Security TCP/IP, Network Architecture, Firewalls, VPNs, Azure Network Security Groups (NSGs), Azure Firewall 3 Cloud Security Microsoft Azure, OpenStack, IAM, Azure Defender, DDoS Protection, Azure Security Center 4 SIEM & SOC Operations Microsoft Sentinel, Chronicle, Splunk, Suricata, KQL, Security Alert Triage, Log Correlation 5 Threat Detection & Response Incident Lifecycle, Threat Hunting, Detection Rules, SOAR (Logic Apps), MITRE ATT&CK 6 Linux & SQL Bash, Shell Scripting, Linux OS, SQL Queries 7 Cryptography & Risk Assessment RSA, Digital Signature, Threat Modeling, Risk Analysis 8 Packet Analysis Wireshark, tcpdump, PCAP, Network Forensics 9 Scripting & Automation Python, Bash, Automation Scripts, Regex, PEP 8 10 Reverse Engineering Ghidra, Jython, DLL Injection, Binary Analysis 11 IoT & Endpoint Security MAC-based Identification, API Integration, Device Profiling 12 Cloud SOC Projects Monitoring Azure AD, VMs, and Sentinel Logs; Automating Playbooks using Logic Apps
Several tools that I used:
#Cloud & Infrastructure: Microsoft Azure, OpenStack, Azure Security Center, Azure AD, Azure Firewall, NSG, VPN Gateway
#SIEM & SOC Operations: Microsoft Sentinel, Chronicle, Splunk, Microsoft Defender XDR, Logic Apps
#Intrusion Detection / Prevention & Packet Analysis: Suricata, Snort, Wireshark, Tcpdump, PCAP
#Programming & Scripting: Python, Bash, KQL (Kusto Query Language), SQL, Regex, PEP 8
#Burp Suite – Web vulnerability scanning and exploitation
#Metasploit Framework – Exploit development and post-exploitation
#Nmap – Port scanning and network discovery
#Hydra – Credential brute-forcing
#Aircrack-ng – Wireless network testing
#SQLMap – SQL injection automation
#Dirb / Gobuster – Web directory brute-forcing
#Nikto – Web server vulnerability scanner
Implemented RSA Encryption/Decryption amd Digital Signature using python. 2024 • Implemented RSA encryption/decryption for secure communication using 16-bit random prime numbers. Integrated digital signatures with private keys to authenticate entitie
- Description: Developed a Jython script plugin for Ghidra targeting known DLL injection techniques. Demonstrated DLL injection in game, showcasing the vulnerabilities. Integrated script into Ghidra to automatically identify instances of these functions in binaries, alerting users to possible DLL injection attacks.
- Technologies Used: Reverse engineering tool Gidra,Python, Java, Wesnoth Game, DLL. more
• Installed OpenStack to deploy a multi-node virtual network and security assessments. • Deployed a cloud environment secured with Snort, an Intrusion Detection and Prevention System (IDPS), to mitigate TCP SYN flood attacks. Integrated custom Snort rules and security groups against real-world cyber threats.
• Developed IoT device scanner using Python, enabled to discover, analyze active devices on local Wi-Fi networks. • Stored captured data in pcap format and organized it in a SQLite database for analysis. • Integrated API calls for real-time vendor identification based on MAC addresses, enhancing user experience by providing detailed device information alongside packet analysis capabilities.
• Analyzed automated deduplication tools such as Syzkaller, Syzbot uncovering limitations to enhance bug detection, aiming to optimize efficiency in Kernel Fuzzer.
- Challenge designer AtHackCTF, Concordia University's first national Capture The Flag competition brought to you by TECHNATION and Hexploit-Alliance. more
Cyber Security Intern Police Cyber Security Summer Internship Gurugram, India • Reviewed 20+ live cybercrime case studies, social engineering attacks, phishing, ransomware, and data breaches. • Collaborated with law enforcement officers to analyze, interpret digital evidence, improving outcomes by 15 percent. • Assisted in developing enhanced cybercrime response protocols based on case study findings.
This portfolio will continuously grow as I complete more certificates and projects. I encourage you to visit again to see my progress and learn more about my skills and experience. Thank you for your time. For more information, please connect with me on Linkedin.