Focus Areas
- SOC Operations & Threat Hunting
- Penetration Testing
- Network Forensics & Packet Analysis
- Security Automation (Python)
Available for internships & opportunities
Cybersecurity Student —
Passionate about defending digital infrastructure. I build security tooling, hunt threats, and break systems ethically to make them stronger.
I'm a cybersecurity student with a deep interest in offensive and defensive security. My focus areas span SOC operations, threat detection, network forensics and ethical hacking.
I thrive in Capture-the-Flag competitions, use hands-on home labs to replicate real-world attacks, and love building Python tooling to automate security tasks.
When I'm not deciphering packet captures or writing SIEM rules, I'm contributing to open-source security projects and reading threat intelligence reports.
Real-time phishing URL detection, suspicious file download alerts, and user-controlled stop/continue protection with activity logging for auditing.
Automated disk usage monitoring with threshold-based alert triggering, cron job integration, and email/log-based system tracking.
Automated password aging checks with advance expiry notifications and policy compliance monitoring using Linux security tools like `chage`.
Detects zombie (Z-state) processes, identifies parent-child PID relationships, and generates system health logs.
Detects files older than defined threshold, automatically archives and compresses them (tar/gzip), with an optional source cleanup.
Tracks login and logout sessions, monitors active users on the system, and generates audit trail logs for security monitoring.
LPU + Red Hat
EarnedRed Hat
EarnedRed Hat
ActiveNPTEL
EarnedReliance Foundation
In ProgressGoogle / Coursera
Earned“Cybersecurity and Computational Intelligence: Protecting the Digital World”
Included in: Next-Generation Computational Intelligence: Trends and Technologies
DOI: 10.1007/978-3-031-96871-6_11
Completed Disk Alert, Archiver, Password Expiry Notifier, Zombie Detector, and User Session Logger. Successfully structured and evaluated.
DevelopmentDVWA on Kali Linux: Environment setup, vulnerability exploitation, and mitigation techniques in a fully documented GitHub project.
PracticalDeveloped Phish Guard browser extension from concept to architecture, implementation, and UI deployment.
InnovationLovely Professional University
Specialisation: Cybersecurity
Pursuing a four-year undergraduate degree with focus on network security, cryptography, and ethical hacking. Active member of the university cybersecurity club.
Sri Chaitanya Junior College
Specialisation: Mathematics, Physics & Computer Science
Completed senior secondary with distinction. Developed foundational interest in computer networks and security through self-study and online communities.
Threat analysis, writeups & field notes from the frontlines of cyber defence.
Modern SIEM platforms generate thousands of alerts daily. The real skill isn't just tuning correlation rules — it's building contextual awareness to triage effectively and reduce analyst fatigue driven by alert storms.
Read MoreStep-by-step breakdown of a multi-stage binary challenge using Ghidra and GDB, from static analysis to dynamic exploitation.
Read More →How adversaries abuse legitimate system binaries like PowerShell and WMI to evade endpoint detection and blend into normal traffic.
Read More →A practical guide to deploying Elasticsearch, Logstash, Kibana, and Filebeat on a single VM to monitor your home network.
Read More →Passive recon using Shodan, theHarvester, and public registries to build a full target picture without triggering any alerts.
Read More →I'm actively seeking cybersecurity internships, SOC analyst roles, and research collaborations. Feel free to reach out about opportunities or just to talk security.