Securing the digital frontier, one packet at a time.
I am a disciplined Cybersecurity enthusiast focused on Blue Team operations and Linux system defense. My portfolio reflects a commitment to practical labs, security tool mastery, and continuous learning in the ever-evolving threat landscape.
Hello, I am
I am a Computer Science and Engineering undergraduate with a strong interest in Cybersecurity, system security, and secure application development.
Currently, I am pursuing my B.Tech in Computer Science, where I have built a solid foundation in programming, operating systems, computer networks, and Linux administration. Alongside academics, I actively upskill through hands-on labs, certifications, and projects focused on cybersecurity defense, cloud computing, and Linux system administration.
My career goal is to work in Blue Team / SOC Analyst roles, where I can contribute to monitoring, detecting, and responding to security incidents. I am also exploring ethical hacking and penetration testing to strengthen my defensive mindset by understanding attacker techniques.
I combine theoretical foundations with practical security implementation, actively building projects, documenting learning, and continuously improving through labs, certifications, and real-world practice.
B.Tech โ Computer Science and Engineering
Intermediate ยท 72%
Matriculation ยท 97%
C++, Python, Shell Scripting, SQL, HTML, CSS, JavaScript
NIST Cybersecurity Framework, OWASP
Wireshark, Nikto, CyberChef, Sqlmap, John the Ripper, TryHackMe, HackTheBox, PicoCTF
Problem Solving, Team Work, Adaptability, AI-Augmented Productivity
A showcase of technologies I've mastered on my journey.
Constantly evolving my skillset to stay ahead in the cybersecurity landscape.
Currently pursuing the Certified Ethical Hacker (CEH) certification to master the offensive perspective required for robust defense. Focusing on understanding attack vectors, vulnerability assessment, and strengthening security postures.
Live statuses from my competitive programming and learning accounts.
A selection of my academic and personal work.
A browser extension and website designed to detect phishing attacks and fake websites in real-time.
A secure vault for credentials featuring RockYou wordlist strength checking.
An ethical network analysis tool built to understand data flow and TCP/IP protocols.
Professional credentials validating my technical expertise.
cloud computing, virtualization, services, distributed systems
Advanced Linux administration, SELinux security, storage, enterprise system management.
Cybersecurity defense training covering threats, networks, incident response, operations.
Competitions, Hackathons, and Academic Milestones.
Contributing to the academic and research community.
In this publication, Iโve contributed to a book chapter focused on the intersection of cybersecurity and computational intelligence. Iโve explored how modern AI-driven techniques strengthen digital defense mechanisms and how intelligent systems detect, prevent, and respond to cyber threats.
My academic timeline.
Bachelor of Technology - BTech, Computer Science
2023 - 2027Grade: 6th Sem
Connect with me for collaborations and opportunities.