top of page

Technical Skills

Programming languages

Security Tools

Other softwares

JavaScript/TypeScript

Backend API development and maintenance​

​

NodeJS

Backend API development and maintenance (9+ APIs)​

​

Python 

Application development using Numpy, Sumy, and Pandas

​​

Git/Github

Version control, collaboration, code review and integrity checks

​

R

Statistical Interpretations and graphs

Nmap

Conducting network scans and finding open hosts and ports

​

Nessus / BugTrack Jira / Nexus IQ

Vulnerability analysis for scanned host addresses

​

Metasploit 

Penetration testing and vulnerability exploitation 

​

Burpsuite 

Explotation attacks for web applications

​

Shodan

Reconnaissance for open IP addresses in the web

​

Sonarqube 

SAST web application code review and fixes

​

CyberArk PAM

Identity and Access management 

​

Dynatrace

User Activity tracking and monitoring, API health analysis 

​

Splunk Enterprise

User logging and SIEM monitoring

​

Apache Kafka 

Real time data streaming and forecasting

​

Postman

API queries and user testing

​

Kubernetes 

Application container deployment and security

​

Docker 

Image generation and deployment

​

Jenkins 

Container deployment and rollbacks 

​

ServiceNow

User incident response and customer service

​

JIRA 

Scrum Board maintenance and support

​

Confluence 

Data sharing and Collaboration

​

Other Skills and Areas of Interest

Security Domains

AI Proficiency

Soft Skills

Security Risk Management 

Analyzing security risks, performing risk assessments, and implementing mitigation measures

​

Software Development Security

Web Application Security through Vulnerability Management​

​

Security Operations and Monitoring  

Incident Response, Security Monitoring and Certificate Compliance â€‹â€‹

​

Cyber Threat Intellgience​​

Threat Analysis, Threat Modelling, Threat Intelligence Gathering, Threat & Strategic Analysis and Reporting

Operationalizing AI

Understanding end to end flow of AI implementation, identifying the operational risks of AI implementation​

​

AI Security

Understanding of the inherent risks with AI models and emergent technologies

 â€‹

AI Red Teaming 

Jailbreaking AI models through various attacks such as prompt injection â€‹

​

​

Leadership 

Project lead and management expert for multiple academic projects ​

​

Communication

Strong Professional and Interpersonal communication skills â€‹

​

Critical Thinking 

Problem solver after deep critical analysis â€‹

​

Project operations Management 

Planning and executing multiple projects from start to end​

​

​

ISC2 CC

ISC2 CISSP

Certification Number: 2698383​​​​

​

Ongoing

Certifications

Coursework

Security

AI and ML

Policy and Management

Ethical Penetration Testing

​​

Introduction to Information Security and Management

​

​Introduction to Cyber Intelligence

​​​

Information Security Risk Management

Fundamentals of Operationalizing AI

​​

ML with Adversaries in Mind​​​

Policy and Governance â€‹â€‹

 

Applied Economics 

​

Professional Speaking

​

Managing Disruptive Technologies​

​

Organizational Design and Implementation

​

bottom of page