> INITIALIZING SECURE SESSION... OK
d4mr0 ...
I break systems to make them unbreakable.
Mission Log
Penetration Tester
Jul. 2024 — Aug. 2025Bright Security | San Rafael, CA
- Conducted comprehensive VAPT across client and internal applications (web, mobile, cloud, thick client).
- Conducted internal security testing and audited cloud infrastructure to identify and remediate misconfigurations, risks, and vulnerabilities, enhancing overall security posture.
- Actively contributed to internal security research and tool development, enhancing the efficiency and effectiveness of in-house security solutions.
- Effectively communicated technical findings to technical and non-technical stakeholders, improving reporting quality, onboarding new clients, and strengthening relationships with existing ones.
Security Researcher (Freelance)
Mar. 2022 — Aug. 2025Bugcrowd | Remote, UK
- Actively participated in bug bounty programs, showcasing expertise in identifying and responsibly disclosing vulnerabilities.
- Strengthened technical skills and deepened understanding of cybersecurity through hands-on engagement in ethical hacking practices.
Core Team Member
Mar. 2024 — Aug. 2025AutoSecurityy | India
- Conducted in-depth research on emerging automobile security threats and industry trends to inform strategic initiatives and content creation.
- Created targeted educational content- including articles, videos, and infographics- aimed at raising cybersecurity awareness among consumers and automotive professionals.
Cloud Security Intern
Nov. 2023 — Jan. 2024Virtually Testing Foundation | CA
- Utilized AWS CloudTrail, CloudWatch, AWS Cognito, Azure Active Directory, and Microsoft Sentinel to secure cloud infrastructures.
- Participated in practical labs, gaining hands-on experience in threat detection and mitigation while developing strong soft skills.
Research & Code
A Meta-Analysis on Early Detection of Skin Cancer using Graph Neural Networks
Architected a GNN model to classify skin disease images. Conducting literature review for peer-reviewed publication.
Comparative Security Evaluation: Human vs. LLM Applications
Independent study comparing vulnerability density in human-written vs. LLM-generated code. Developing security benchmarks.
EasyTUS: Efficient Table Union Search (CSCI 3331)
Reviewed and analyzed the EasyTUS research paper and implemented a PoC demonstrating fuzzy table-matching.
Smart Agriculture Platform: ML
AI-driven farming system with crop/fertilizer recommendations (Random Forest, Decision Tree) integrating weather and price trends.
Embedded Security with AI using StreamLit
Automated recon tool using YOLO and LLMs to analyze hardware datasheets and FCCID information.
Fleet Management System: Database
Developed an SQL-based database for vehicle registration, driver management, route planning, and maintenance scheduling.
Signals in the Wild: Exploring RF Systems using HackRF One
Developed and delivered a live demo showcasing ADS-B aircraft tracking, RF signal decoding, and replay attacks on low-frequency devices using HackRF One, GNU Radio, and Python.
Teen Sage (Mobile Application)
Developed a mobile application focused on adolescent mental health and sex education.
Facial Landmark & Object Detection (Hackathon Project)
Recreated a TensorFlow.js project from a YouTube tutorial featuring real-time facial landmark detection, “Miss Happening” capture, and object recognition; showcased at a hackathon to demonstrate practical computer vision applications.
Neural Arsenal
OFFENSIVE
- Web/Mobile VAPT
- Active Directory
- Burp Suite Pro, Metasploit, Sqlmap
- Vulnerability Management
CLOUD/INFRA
- AWS (IAM/S3/CloudTrail)
- Azure Security, GCP
- Network Security, Endpoint Security
- Radio Hacking
- Wireshark, Splunk
AI/ENGINEERING
- Python, C/C++, JavaScript
- TensorFlow/PyTorch, LLM/Langchain
- Big Data Analytics, SQL/NoSQL
- Flutter, Solidity, Bash Scripting
HARDWARE/IOT
- Firmware Testing, Binwalk
- ARM & x86 Assembly
- Binary Exploitation, UART, JTAG
- IoT Security, CANbus, Modbus
Validation Log
VERIFIED CREDENTIALS
COMPETITIVE VICTORIES
HALL OF FAME (40+)
Academic Path
Bachelor of Science in Computer Science (Dual Program)
Fairleigh Dickinson University & Caucasus University
Anticipated May 2026
Relevant Coursework:
- CS: Algorithms, Machine Learning, Big Data Analytics, Computer Networks.
- Math: Calculus, Linear Algebra, Probability & Statistics.
- Electives: Deep learning & Application, Security Application, Forensic Psychology.