🚀B.Tech CSE - Cyber Security student. I work on finding vulnerabilities and securing the organisations.
View Resume ⤴JAIN (Deemed-to-be University)
I am doing B.Tech in Computer Science major in CyberSecurity and minor in Artifical Intelligence.
GPA: 8.0
EC Council
Gained hands-on knowledge of network security, including intrusion detection, incident response, firewall configuration, and threat analysis. Trained to defend, detect, and respond to network-based attacks in enterprise environments.
Coursera
Miles Education
Skills - Cisco Packet Tracer , Wireshark , Python, Burpsuite.
Developed various network topologies to optimize packet transfer efficiency. Utilized Wireshark to trace and analyze packet transfers and timing, and employed Python to automate packet capture and data analysis. This project provided me with hands-on experience in network analysis and cybersecurity protocols, enhancing my ability to contribute effectively to cybersecurity initiatives.
Developed a full-stack Night Snack Store web application using Next.js and NextAuth, enabling hostel students to order snacks easily and sellers to manage listings with Google authentication. Implemented role-switching between buyer and seller and simplified order payments with cash or UPI on delivery.
Tools used: Next.js, Node.js, Google Auth, Atlas.
Develop an IDS that uses ML models to classify network traffic as normal or malicious. Use datasets like KDD Cup 99 or NSL-KDD.
Tools used: Python, Scikit-learn, TensorFlow/PyTorch.
Build a Hospital Managment System including Calendly and many other api to maintain and automate the hospital management.
A secure cloud-based file storage system where users can upload/download files with encryption. Uses AES encryption before storing files and decrypts only after authentication.
Tools used: Next.js, Node.js, Python (Flask/FastAPI), Crypto.js, Firebase/PostgreSQL.
Working on Paytm clone to learn about JWT Token, Different API's and too learn deaply about Authentication Systems.
IJCTR Publication • Jan 2025 • Co-authored with Vasi N Jain, Vaibhav Dhonde, Dhrutik Kummar Patel, Rishav Ranjan and Dr. S. Ravikumar.
This paper explores using a Face Security API to enhance edge computing security, addressing challenges like unauthorized access and data breaches. It evaluates the API’s effectiveness, examines its limitations, and considers ethical implications, offering insights and recommendations.