About
Cybersecurity enthusiast with a strong foundation in ethical hacking, penetration testing, and threat analysis. Hands-on experience with tools like Metasploit, Wireshark, and Burp Suite. Engaged in CTF challenges and practiced Red & Blue Teaming. Eager to apply my skills in real-world environments and contribute to securing digital infrastructure. Looking for an opportunity to grow as a security analyst in a dynamic organization.
Skills & Expertise (14)
Work Experience
Cybersecurity Awareness Web App
Self-employed
N/A-N/A - N/A-N/A
Built a responsive website to teach users about phishing, secure passwords, and basic encryption. Used Flask (Python), Bootstrap, and MySQL for the backend. Designed interactive modules and basic simulations for common cyber threats.
Capture The Flag (CTF) Challenges
Self-employed
N/A-N/A - N/A-N/A
Participated in TryHackMe & HackTheBox CTFs, solving real-world security scenarios related to exploitation, privilege escalation, and threat detection.
Red & Blue Teaming Simulations
Self-employed
N/A-N/A - N/A-N/A
Practiced offensive (Red Team) and defensive (Blue Team) cybersecurity strategies in virtual environments.
Home Lab Setup
Self-employed
N/A-N/A - N/A-N/A
Configured a virtual lab with Kali Linux, Metasploit, and vulnerable machines (e.g., Metasploitable, DVWA) for penetration testing and security research.
Open-Source Security Tools
Self-employed
N/A-N/A - N/A-N/A
Hands-on experience with Wireshark (network analysis), Nmap (network scanning), Burp Suite (web security testing), and OSINT tools for reconnaissance.
Education
Bachelor of Computer Application (BCA) - Cyber Security, Ethical Hacking, and Cloud Computing
2022 - 2025 · India
Certifications
Certified Ethical Hacker (CEH v13)
EC-Council · 2025
Certified Ethical Hacker (CEH v13) – EC-Council (2025) The CEH v13 certification validates advanced knowledge of ethical hacking techniques and tools used by cybersecurity professionals. It covers the five phases of ethical hacking—reconnaissance, scanning, gaining access, maintaining access, and covering tracks—with practical labs and real-world attack scenarios. The certification demonstrates proficiency in identifying vulnerabilities, performing penetration testing, and securing systems against modern cyber threats. It is recognized globally as a key credential for cybersecurity professionals focused on offensive security.
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation