Cybersecurity Enthusiast | CTF Participant |Security +|CCNA|Aspiring security expert, passionate about cybersecurity, actively engaging in Capture the Flag (CTF) competitions to sharpen my problem-solving skills and technical expertise. I have foundational knowledge in networks and am eager to explore all domains of cybersecurity, from threat hunting and incident response to ethical hacking and security architecture. Constantly seeking opportunities to learn, contribute, and grow in this dynamic, critical field.
Insider threat detection using machine learning (team pod-based detection)
Developed a real-time insider threat detection framework using Python, Streamlit, and ML models (XGBoost, Isolation Forest, Autoencoders) to analyze six critical log types (auth, CI/CD, container, Kubernetes, network, auditd) in DevSecOps environments
Simulated live log ingestion and performed rule-based and ML detection every 5 minutes, generating descriptive alerts (e.g., privilege escalation, off-hours access, external IPs)
Designed a SIEM-style dashboard with total log metrics, alert tables, top-risk users, and minute-wise alert breakdown to enhance analyst visibility and response
Vulnerability Risk Scoring System using NLP and Machine Learning
‣ Developed a Vulnerability Risk Score (VRS) model that enhances CVSS-based vulnerability prioritization by integrating exploitability, impact scope, and patch availability.
‣ Used transformer-based NLP to extract contextual fields from CVE descriptions and trained a Random Forest Regressor for real-time VRS prediction to support smarter remediation decisions.
Stealth Keylogger in Python
‣ Implemented a Python-based keylogger that captures and logs user keystrokes using the pynput library with stealth functionality and periodic reporting.
‣ Integrated features such as hidden execution, automatic logging to file, and optional email-based reporting, demonstrating understanding of low-level system hooks and cybersecurity tool behavior.
CENTIALS (CLUB) actively organized Capture the Flag (CTF) competitions, enhancing both leadership and technical skills, developed hands-on expertise by completing challenges on platforms like TryHackMe, gained valuable insights into bug bounty programs and ethical hacking methodologies, and networked with like-minded peers and industry professionals to continuously expand knowledge in cybersecurity and stay updated with the latest trends