Technical Skills
Programming languages
Security Tools
Other softwares
JavaScript/TypeScript
Backend API development and maintenance​
​
NodeJS
Backend API development and maintenance (9+ APIs)​
​
Python
Application development using Numpy, Sumy, and Pandas
​​
Git/Github
Version control, collaboration, code review and integrity checks
​
R
Statistical Interpretations and graphs
Nmap
Conducting network scans and finding open hosts and ports
​
Nessus / BugTrack Jira / Nexus IQ
Vulnerability analysis for scanned host addresses
​
Metasploit
Penetration testing and vulnerability exploitation
​
Burpsuite
Explotation attacks for web applications
​
Shodan
Reconnaissance for open IP addresses in the web
​
Sonarqube
SAST web application code review and fixes
​
CyberArk PAM
Identity and Access management
​
Dynatrace
User Activity tracking and monitoring, API health analysis
​
Splunk Enterprise
User logging and SIEM monitoring
​
Apache Kafka
Real time data streaming and forecasting
​
Postman
API queries and user testing
​
Kubernetes
Application container deployment and security
​
Docker
Image generation and deployment
​
Jenkins
Container deployment and rollbacks
​
ServiceNow
User incident response and customer service
​
JIRA
Scrum Board maintenance and support
​
Confluence
Data sharing and Collaboration
​
Other Skills and Areas of Interest
Security Domains
AI Proficiency
Soft Skills
Security Risk Management
Analyzing security risks, performing risk assessments, and implementing mitigation measures
​
Software Development Security
Web Application Security through Vulnerability Management​
​
Security Operations and Monitoring
Incident Response, Security Monitoring and Certificate Compliance ​​
​
Cyber Threat Intellgience​​
Threat Analysis, Threat Modelling, Threat Intelligence Gathering, Threat & Strategic Analysis and Reporting
Operationalizing AI
Understanding end to end flow of AI implementation, identifying the operational risks of AI implementation​
​
AI Security
Understanding of the inherent risks with AI models and emergent technologies
​
AI Red Teaming
Jailbreaking AI models through various attacks such as prompt injection ​
​
​
Leadership
Project lead and management expert for multiple academic projects ​
​
Communication
Strong Professional and Interpersonal communication skills ​
​
Critical Thinking
Problem solver after deep critical analysis ​
​
Project operations Management
Planning and executing multiple projects from start to end​
​
​
ISC2 CC
ISC2 CISSP
Certifications
Coursework
Security
AI and ML
Policy and Management
Ethical Penetration Testing
​​
Introduction to Information Security and Management
​
​Introduction to Cyber Intelligence
​​​
Information Security Risk Management
Fundamentals of Operationalizing AI
​​
ML with Adversaries in Mind​​​
Policy and Governance ​​
Applied Economics
​
Professional Speaking
​
Managing Disruptive Technologies​
​
Organizational Design and Implementation
​