Highly motivated and results-oriented B.Tech student specializing in Computer Science and Engineering, with hands-on experience in cybersecurity, threat intelligence, and machine learning. Proven ability to lead technical teams, conduct in-depth data analysis, and develop innovative solutions for complex security challenges. Seeking to leverage strong analytical skills, technical expertise, and a commitment to continuous learning to contribute to cutting-edge technology and security initiatives.
Threat Hunting and ML Intern
Mphasis | Intern
Jun 2025 - Present
Actively contributing to defensive security initiatives within Mphasis's CRO SOC team, gaining direct mentorship from a former CERT-In scientist and cyber defense head. My primary focus involves developing an automated forensic tool to streamline system compromise assessment based on advanced artifact analysis.• Deveveloping a forensic tool to automate compromise assessment for Windows/Linux systems, analyzing 220+ key artifacts to determine system integrity. • Supported Integrating industry-standard tools like KAPE, Eric Zimmerman's tools, and Sigcheck, alongside Zircolite with Sigma rules, for comprehensive event log and file-based threat hunting. • This ongoing project aims to streamline forensic investigations, significantly enhancing the ability to rapidly identify and confirm system compromises through robust artifact analysis.
Cyber Threat Research Intern
CyberXtron
Jun 2024 - Jan 2025
Contributed to enhancing threat detection and intelligence capabilities within an Operational Technology (OT) team, focusing on data analysis and cross-functional collaboration.
Threat Analyst Intern
Information Sharing and Analysis Center
May 2024 - Jul 2024
Supported cybersecurity intelligence efforts through DarkWeb data analysis and internal team collaboration, undergoing training as a Cybercriminal Intervention Officer.
Computer Science and Engineering
SRMIST
SGPA: 9.3, CGPA: 8.95
Courses
Linux Systems
Linux Foundation
Ethical Hacking
MSME PPDC
100W Industrial Control Systems (ICS) Cybersecurity Practices
Cybersecurity and Infrastructure Security Agency (CISA)
CEH v13
EC-Council (In-progress)
Vigilance Endpoint Protector (VEP)
Developed Vigilance Endpoint Protector (VEP), a proof-of-concept unified EDR/DLP agent. This agent collects high-fidelity endpoint telemetry from Windows systems via Sysmon, processes it into structured JSON logs, and seamlessly forwards it to Wazuh for centralized aggregation. VEP's foundation aims to provide scalable threat detection and data loss prevention capabilities, specifically enhancing security for resource-constrained small to medium-sized businesses.
CANSAT Competition – NASA (Team 3190, ranked 5th in India and 10th globally)
Led the software team for a NASA CANSAT competition, developing avionics and flight software, achieving top marks in software during the Preliminary Design Review (PDR), and designing active fin control systems.
ML for Drone-based Surveillance & Object Detection (Published at: ICECA 2024)
Conducted research and developed an ML-based system for real-time object detection using drone footage, including training deep learning models and integrating computer vision techniques.
Research on ML for Drone-based Surveillance & Object Detection
ICECA 2024
Published research on developing an ML-based system for real-time object detection using drone footage, optimizing models for challenging conditions, and integrating computer vision techniques.
Threat Detection & Incident Analysis Automation
Endpoint Security & Telemetry Engineering
Cybersecurity
Machine Learning & AI
Programming Languages
Systems & Tools
Data Analysis