Experience
-
Led red-team operations and simulated attack scenarios.
-
Deployed cloud security policies and hardened Linux servers.
-
Improved network resilience through advanced risk assessments.
-
Designed and implemented endpoint security protocols.
-
Automated threat detection pipelines and vulnerability assessments.
-
Collaborated with DevOps to integrate secure CI/CD practices.
-
Reduced system exploits by 40%.
-
Conducted research on AI-driven intrusion detection systems.
-
Optimized cryptographic protocols for secure communications.
-
Co-authored paper on intelligent threat modeling using machine learnin
-
Assisted in penetration testing, malware analysis, and network intrusion detection.
-
Built automated scripts to monitor SIEM logs.
-
Improved detection speed and response accuracy.
Comprehensive undergraduate program covering computer networks, operating systems, and programming. Completed projects on secure cloud deployment, web application security, and system hardening practices. Developed strong foundation in cybersecurity principles and practical system security.
Specialized certification program focused on penetration testing, vulnerability assessment, and ethical hacking techniques. Gained practical skills in identifying and mitigating security risks, automating security tests, and reporting actionable insights for enterprise systems.
Advanced program focusing on network security, cryptography, intrusion detection, and secure software development. Developed hands-on projects in AI-driven threat detection and automated penetration testing, bridging theory with practical cybersecurity applications.
This paper explores AI-based anomaly detection models for real-time intrusion detection in enterprise networks. It demonstrates improved detection rates compared to traditional signature-based systems, using machine learning algorithms for threat prediction and alert automation.
This research introduces an automated penetration testing suite covering OWASP Top 10 vulnerabilities. It integrates tools like Metasploit and Burp Suite, with Python scripts for automated reporting and continuous vulnerability assessment, reducing human error in security audits.
The publication focuses on best practices for deploying secure, multi-tenant cloud infrastructures. It includes automated audit workflows, encryption strategies, and access control mechanisms to prevent unauthorized access and data breaches in cloud systems.