top of page

Technical Skills

Programming languages

Security Tools

Other softwares

JavaScript/TypeScript

Backend API development and maintenance

NodeJS

Backend API development and maintenance (9+ APIs)

Python 

Application development using Numpy, Sumy, and Pandas

Git/Github

Version control, collaboration, code review and integrity checks

R

Statistical Interpretations and graphs

Nmap

Conducting network scans and finding open hosts and ports

Nessus / BugTrack Jira / Nexus IQ

Vulnerability analysis for scanned host addresses

Metasploit 

Penetration testing and vulnerability exploitation 

Burpsuite 

Explotation attacks for web applications

Shodan

Reconnaissance for open IP addresses in the web

Sonarqube 

SAST web application code review and fixes

CyberArk PAM

Identity and Access management 

Dynatrace

User Activity tracking and monitoring, API health analysis 

Splunk Enterprise

User logging and SIEM monitoring

Apache Kafka 

Real time data streaming and forecasting

Postman

API queries and user testing

Kubernetes 

Application container deployment and security

Docker 

Image generation and deployment

Jenkins 

Container deployment and rollbacks 

ServiceNow

User incident response and customer service

JIRA 

Scrum Board maintenance and support

Confluence 

Data sharing and Collaboration

Other Skills and Areas of Interest

Security Domains

AI Proficiency

Soft Skills

Security Risk Management 

Analyzing security risks, performing risk assessments, and implementing mitigation measures

Software Development Security

Web Application Security through Vulnerability Management

Security Operations and Monitoring  

Incident Response, Security Monitoring and Certificate Compliance 

Cyber Threat Intellgience

Threat Analysis, Threat Modelling, Threat Intelligence Gathering, Threat & Strategic Analysis and Reporting

Operationalizing AI

Understanding end to end flow of AI implementation, identifying the operational risks of AI implementation

AI Security

Understanding of the inherent risks with AI models and emergent technologies

 

AI Red Teaming 

Jailbreaking AI models through various attacks such as prompt injection 

Leadership 

Project lead and management expert for multiple academic projects ​

Communication

Strong Professional and Interpersonal communication skills 

Critical Thinking 

Problem solver after deep critical analysis 

Project operations Management 

Planning and executing multiple projects from start to end

ISC2 CC

ISC2 CISSP

Certification Number: 2698383

Ongoing

Certifications

Coursework

Security

AI and ML

Policy and Management

Ethical Penetration Testing

Introduction to Information Security and Management

Introduction to Cyber Intelligence

Information Security Risk Management

Fundamentals of Operationalizing AI

ML with Adversaries in Mind

Policy and Governance 

 

Applied Economics 

Professional Speaking

Managing Disruptive Technologies​

Organizational Design and Implementation

bottom of page