About me

I'm a cybersecurity professional with a passion for both offensive and defensive operations. With certifications in RHCSA, CEH, CRTA, CPTS, CDSA, and Security+, I specialize in Active Directory attacks, Kerberos trust abuse, and scripting attack chainsβ€”while also triaging SIEM alerts, responding to incidents, and securing hybrid environments. While I’ve built a strong foundation in SOC operations and adversary simulation, I’m currently expanding my expertise into cloud security, focusing on IAM hardening, misconfiguration detection, and cloud-native threat defense. My long-term goal is to transition into a Cloud Security Engineer role, where I can design scalable security architectures and drive proactive protection across cloud platforms.

What i'm doing

  • design icon

    Security Operations & Incident Response

    πŸ›‘οΈ Actively engaged in blue team workflows including SIEM alert triage, log analysis, and threat containment. Building expertise in detecting and responding to adversarial activity across hybrid environments.

  • Web development icon

    Threat Detection Engineering

    🧠 Developing and tuning detection rules using Sigma, Sysmon, and MITRE ATT&CK mapping. Focused on improving visibility and reducing false positives through data-driven analysis.

  • Cloud Security Development

    ☁️ Currently learning AWS and Azure security fundamentals, including IAM hardening, audit logging, and misconfiguration detection. Preparing for future transition into a Cloud Security Engineer role.

  • camera icon

    Technical Reporting & Documentation

    πŸ“ Creating structured incident reports, CVSS scoring, and SysReptor-formatted documentation. Emphasizing clarity, reproducibility, and alignment with industry standards.

  • camera icon

    CTF Participation & Adversary Simulation

    🎯 Actively solving challenges on Hack The Box and TryHackMe to sharpen skills in enumeration, privilege escalation, and lateral movement. Using CTFs to simulate real-world attack scenarios and improve defensive strategies.

>

Resume

Education

  1. M.Sc. Information Security

    Dec 2025 β€” 2027 (Ongoing)

    Postgraduate program focused on advanced cybersecurity concepts including cloud security, incident response, and threat intelligence.

  2. Bachelor of Computer Applications (BCA)

    July 2021 β€” 2024

    Completed undergraduate studies at Ganga Institute of Technology and Management (MDU). Built foundational knowledge in programming, networking, and system administration.

Certifications

  1. CPTS – Certified Penetration Testing Specialist

    2025

    Hack The Box – Focused on enumeration, privilege escalation, and reporting.

  2. CRTA – Certified Red Team Analyst

    2024

    CyberWarfare Academy – Adversary simulation, lateral movement, and Active Directory exploitation.

  3. CEH – Certified Ethical Hacker

    2024

    EC-Council – Core offensive security techniques and ethical hacking principles.

  4. RHCSA – Red Hat Certified System Administrator

    2023

    Linux system administration, shell scripting, and server management.

  5. Security+ – CompTIA

    2023

    Network security, risk management, and incident response fundamentals.

  6. CDSA – Certified Defensive Security Analyst

    2023

    Defensive operations, SIEM analysis, and threat detection workflows.

Hands-On Experience

  1. SIEM Tuning & Threat Detection

    2024 β€” Present

    Created Sigma rules and Sysmon configs to detect Kerberoasting and SPN enumeration. Improved detection accuracy in lab environments.

  2. Cloud IAM Audit Script (AWS)

    2024

    Developed Python script to identify misconfigured IAM roles and unused access keys. Proposed least-privilege fixes.

  3. CTF Participation – HTB & TryHackMe

    2023 β€” Present

    Actively solving challenges focused on privilege escalation, enumeration, and adversary simulation. Documenting workflows for portfolio inclusion.

My Skills

  • SIEM & Incident Response
    85%
  • Threat Detection & MITRE Mapping
    80%
  • Cloud Security Fundamentals (AWS/Azure)
    20%
  • Scripting & Automation (Python, Bash)
    75%
  • Active Directory Enumeration & Abuse
    50%
  • Web Application Pentesting
    50%

Blog

Contact

Contact Form