Global Mentorship Program 2024-2025
→
Summary
Received mentorship in Microsoft Power BI, gaining hands-on experience in data analysis and visualization.
A highly motivated and results-driven Cybersecurity and Digital Forensics student with a strong foundation in offensive security, incident response, and cryptographic systems. Proven ability to apply technical expertise in real-world scenarios, demonstrated through leading a secure image encryption project, achieving top performer status in a DFIR internship, and exploiting web application vulnerabilities. Eager to leverage advanced skills in Python, network security, and data analysis to contribute to innovative cybersecurity solutions.
Cybersecurity Intern
Remote, Remote, Global
→
Summary
Executed offensive security tasks and vulnerability assessments to identify and remediate critical web application vulnerabilities.
Highlights
Exploited web application vulnerabilities (SQL Injection, Cross-Site Scripting, CSRF) through offensive security tasks, enhancing understanding of attack vectors.
Conducted comprehensive vulnerability assessments and risk analysis using industry-standard tools like Burp Suite, Nmap, and Wireshark, identifying critical security flaws.
Demonstrated proficiency in OWASP Top 10 vulnerability classes, implementing effective remediation strategies to secure web applications.
Participated actively in Capture The Flag (CTF) challenges, gaining hands-on experience in reverse engineering, cryptographic cracking, and binary exploitation.
Strengthened knowledge of secure coding practices, web application firewalls (WAF) evasion, and threat modeling, contributing to robust security solutions.
Cybersecurity Intern
Remote, Remote, Global
→
Summary
Contributed to network security, threat analysis, and incident response, automating security audits and supporting research on emerging cyber threats.
Highlights
Developed and automated security audits using Python, significantly improving efficiency and accuracy in threat detection.
Contributed to research on emerging cyber threats, enhancing the center's knowledge base and proactive defense strategies.
Gained practical experience in network security operations, threat analysis, and incident response protocols.
Supported various security initiatives, applying theoretical knowledge to real-world cybersecurity challenges.
Collaborated with senior researchers to analyze complex security incidents and develop mitigation strategies.
Digital Forensics & Incident Response (DFIR) Intern
Greater Noida, Uttar Pradesh, India
→
Summary
Led a comprehensive two-month digital forensics and incident response internship, gaining practical experience in analyzing digital evidence and responding to complex cyber threats.
Highlights
Recognized as a Top 20 Performer out of 5,000+ candidates, demonstrating exceptional aptitude and securing a Letter of Recommendation for advanced DFIR skills.
Conducted in-depth analysis across advanced DFIR domains including blockchain forensics, cloud investigations, OSINT, AI/deepfake forensics, and memory/image/disk recovery.
Utilized a diverse toolkit including Autopsy, FTK Imager, Volatility, Wireshark, Cellebrite, ELK Stack, Maltego, and OSINT tools for comprehensive forensic investigations.
Applied expertise in incident response, malware forensics, email/network analysis, VAPT, and AML/CTF, enhancing security posture and threat detection capabilities.
Gained practical experience in cybersecurity management, ensuring robust defense strategies and effective response protocols for complex cyber threats.
Speaker Curation Team
→
Summary
Spearheaded speaker selection and content refinement for the inaugural TEDx event, ensuring alignment with TEDx standards and thematic relevance.
Highlights
Contributed significantly to the success of the inaugural TEDx event "Exceeding the Excess" at Sharda University.
Curated and evaluated speaker applications, ensuring strict alignment with TEDx standards and thematic relevance.
Collaborated directly with speakers on script refinement, storytelling structure, and stage delivery, enhancing presentation quality.
Coordinated seamlessly between speakers, organizing committee, and the production team to ensure a smooth event execution.
Managed logistics and communication for a diverse group of 9 featured speakers, including high-profile professionals.
Student Coordinator, FACS Training Program
→
Summary
Coordinated and contributed to the successful execution of a one-week hybrid training program on Advanced Cybersecurity for 300+ participants.
Highlights
Collaborated with CCSC to organize a one-week hybrid "Fundamentals of Advanced Cybersecurity (FACS)" training program, covering vulnerability assessment, digital forensics, and GRC.
Managed participant coordination, communication, and logistics for 300+ attendees, faculty, and industry experts, ensuring smooth event flow.
Facilitated interactive discussions and contributed to program success by ensuring seamless session execution and attendee engagement.
Developed strong organizational and communication skills in a large-scale academic event environment.
Supported the successful delivery of critical cybersecurity knowledge to a diverse audience.
Core Member, Drama Club
→
Summary
Actively participated in theatrical and cultural events as a Core Member of the university-sponsored Drama Club, enhancing public speaking and teamwork skills.
Highlights
Selected as part of the team to perform at "Antrangi," a flagship cultural event recognized for creativity and performance arts.
Contributed to stage production, acting, and team coordination for multiple live performances.
Improved public speaking, emotional expression, and audience engagement through active participation in theatrical events.
Demonstrated strong teamwork and collaboration skills within a creative environment.
Successfully executed performances that showcased creativity and enhanced cultural engagement within the university.
→
Bachelor of Technology (B.Tech)
Cyber Security & Forensics
Courses
Ethical Hacking Lab
Digital Forensics Lab
Operating Systems
Artificial Intelligence
Programming and Data structures
Computer Organization and Architecture
Web and Mobile Application Security
Introduction to Cyber Laws
Digital Forensics
Security Architecture
Ethical Hacking
Risk Management
→
Class XII
General Studies
→
Class X
General Studies
Awarded By
IIMT College of Engineering & Future Crime Research Foundation
Recognized as a top 20 performer out of 5,000+ candidates for exceptional work during the Digital Forensics & Incident Response internship, leading to a Letter of Recommendation.
Awarded By
Embibe
Awarded for consistent academic engagement on India's top learning platform.
Awarded By
TERI
Recognized for excellence in environmental awareness by TERI.
Awarded By
Cultural Exchange Program
Participated in cross-border dialogue on global culture and innovation.
Awarded By
CSIR-CECRI
Received a national-level award for scientific writing.
Awarded By
India International Science Festival (IISF)
Represented institution at the India International Science Festival.
Issued By
EC-Council
Issued By
ISO
Issued By
Issued By
Cisco
Issued By
Issued By
Udacity
Issued By
Udemy
Issued By
University of Maryland
Issued By
ISC2
Issued By
Issued By
Issued By
IAPP
Issued By
GISA COUNCIL
Issued By
Issued By
Python, C++, C, Java, SQL.
Pandas, NumPy, Matplotlib, Scikit-learn, TensorFlow.
Jupyter Notebook, Google Colab, VS Code, Git, GitHub.
Linux, Windows, macOS, Ubuntu.
Autopsy, Wireshark, Burpsuite, Nmap, FTK Imager, Microsoft Sentinel, Cellebrite, ELK Stack, Maltego, OSINT tools, Burp Suite, Volatility.
Computer Networks, OS, DBMS, Data Structures and Algorithms, Ethical Hacking, Digital Forensics, Artificial Intelligence, Programming and Data structures, Computer Organization and Architecture, Web and Mobile Application Security, Introduction to Cyber Laws, Security Architecture, Risk Management, Vulnerability Assessment, Malware Analysis, Governance Risk & Compliance (GRC), Cyber Threat Intelligence (CTI), Blockchain forensics, Cloud investigations, AI/deepfake forensics, memory/image/disk recovery, CDR/IPDR/PCAP, Malware forensics, Email & network analysis, VAPT, Cell site forensics, AML/CTF, SQL Injection (SQLi), Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), OWASP Top 10, Reverse Engineering, Cryptographic Cracking, Binary Exploitation, Network Enumeration, Secure Coding Practices, WAF Evasion, Threat Modeling, Network Security, Threat Analysis, Incident Response.
Team Leadership, Public Speaking, Event Organization, Strategic Planning, Project Management, Structural Analysis, Automation, CAD, Problem-Solving, Critical Thinking, Collaboration, Innovation, Professional Growth, Data Visualization.
Cybersecurity, Blockchain, Web3, AI, ML.
Lifelong Learning, Community Development.
→
Summary
Received mentorship in Microsoft Power BI, gaining hands-on experience in data analysis and visualization.
→
Summary
Selected for a prestigious leadership, innovation, and professional growth program at Harvard University, engaging in advanced coursework and mentorship.
→
Summary
Led the development of a secure encryption-decryption system using Advanced Encryption Standard (AES) to protect image files, ensuring confidentiality, integrity, and resistance to cryptanalysis in digital transmission and storage.