I like AI automation, Linux, and every aspect of cybersecurity — Red Teaming, Blue Teaming, Digital Forensics, and even building websites and automation tools.
About
Red Team (Offensive)
- External & Internal Penetration Testing Lab: Nessus, Metasploit, manual exploitation
- Advanced Web Application Testing: Burp Suite, OWASP Top 10 exploitation
- Active Directory Attack Simulation: Kerberoasting, Pass-the-Hash, lateral movement
- Password Cracking & Credential Attacks: Hydra, Hashcat, wordlist optimization
- Social Engineering & Phishing Campaign Design
- Post-Exploitation & Persistence Techniques: C2 setup, data exfiltration
Blue Team (Defensive)
- SIEM Implementation & Optimization: QRadar, Wazuh, ELK Stack
- Dark Web Threat Monitoring & Intelligence Correlation
- DLP Policy Configuration & Data Exfiltration Prevention
- Suricata IDS/IPS Network Threat Detection Lab
- Incident Response Simulation: SOC playbook execution, IOC triage
- Threat Hunting Engagement: APT behavior detection using MITRE ATT&CK mapping
Experience
SOC Intern
eSec Forte Technologies
July 2025 – Present
SIEM (QRadar) alert triage, incident detection, false positive validation. DLP monitoring and dark web threat intelligence activities.
Cyber Security Intern
Gurugram Police
June 2025
Digital forensics, evidence analysis, and red teaming. Assisted in vulnerability assessment and incident investigation.
Certifications
CompTIA A+
ISC2 Certified in Cybersecurity (CC)
and many more
Education
Bachelor of Technology (B.Tech) — Computer Science (CSE)
Chaudhary Devi Lal University (CDLU), Haryana
2022–2025
Skills
Offensive
Penetration Testing, Vulnerability Assessment, Exploitation, OSINT
Defensive
SIEM (QRadar, Wazuh, Splunk), Threat Hunting, IDS/IPS (Suricata), Malware Analysis, Threat Intelligence
Contact