Cybersecurity Master's student at Northeastern University with hands-on experience in digital forensics, SIEM operations, and malware analysis. Built enterprise security labs, developed detection rules, and conducted forensic investigations. Currently a TA for Cybersecurity Principles at Khoury College of Computer Sciences. Always up for coffee and book recommendations.
Key Courses: Linux Kernel Security, Software Vulnerabilities and Security, Network Security; Cybersecurity: Technologies, Threats and Defense; Information System Forensics; Cyberlaw
GPA: 3.72/4.0
Key Courses: Computer Networks; Operating Systems; Network Security; Artificial Intelligence; Computer Communications
GPA: 9.21/10
Developing a userland rootkit implementing file protection mechanisms, process hiding, and self-defense capabilities using shared object injection techniques. Currently implementing file read/write protection, file existence hiding, and deletion protection with selective access control for authorized processes.
In ProgressConducting comprehensive security and compliance assessment for an AI healthcare company, evaluating adherence to FDA and CE compliance frameworks. Performing risk assessments, security control validation, and regulatory gap analysis.
In ProgressDeploying Wazuh SIEM/XDR with centralized log management from Windows workstation and hardened Linux bastion. Built dashboards for alert triage and security monitoring. Currently working on automating threat detection workflows.
View on GitHubInvestigated 4 insider threat and data exfiltration cases using Autopsy, FTK Imager, and Volatility. Analyzed USB artifacts, registry hives, and shellbags to identify IOCs. Performed malware analysis and identified anti-forensic activity through prefetch, jump list, and LNK file analysis.
View on GithubInvestigated 10+ simulated incidents covering malware, phishing, and intrusion scenarios on CyberDefenders platform. Triaged alerts, extracted IOCs using Wireshark and Volatility, and mapped findings to MITRE ATT&CK framework. Created structured incident reports documenting investigation methodology and remediation actions.
View ProfileBuilt encrypted peer-to-peer chat system with SRP authentication, ECDH key exchange for forward secrecy, and AES-256-GCM encryption. Implemented session key derivation using HKDF, rate limiting to prevent abuse, and multi-user support.
View on GithubDeveloped an algorithm to encrypt and decrypt live videos and transmit them over Wi-Fi using AES-256 encryption and custom frame-shuffling algorithms.
View on GitHubA phishing detection system that utilizes deep learning techniques to detect and prevent phishing attempts.
View on Github • Designing and developing hands-on labs covering risk management frameworks and core cybersecurity principles.
• Evaluating student assignments on Linux security fundamentals, Python/Bash scripting, and risk analysis techniques.
• Guiding 20+ graduate students during office hours on cybersecurity concepts, forensics, and compliance frameworks.
• Architected and implemented a secure video transmission system utilizing AES encryption and symmetric key cryptography.
• Developed a real-time streaming platform with end-to-end encryption over Wi-Fi.
• Integrated PyCrypto for robust encryption and OpenCV for efficient video processing.
• Implemented frame shuffling and anti-tampering mechanisms to thwart man-in-the-middle attacks.
• Managed and configured network security infrastructure including routers, switches, and firewalls.
• Implemented VLAN segmentation and performed regular security monitoring with Wireshark/tcpdump.
• Analyzed firewall logs to identify and report potential threats; improved incident response protocols.
CompTIA
CompTIA
ISC2
WiCyS + Coursera
SimSpace
Amazon Web Services
Served on the executive board supporting club operations and growth initiatives for Northeastern's graduate cybersecurity club, nullNEU
Contributions:Actively engaged in WiCyS programs focused on cybersecurity skill development and professional growth.
- Target Cyber Defense Challenge: Qualified for Tier 2 (Attack Track) as one of 50 participants globally selected to advance from Tier 1 Defense Track, demonstrating proficiency in both defensive and offensive security operations.Favorite Genres: Mystery, thriller and plot twists
Currently Reading: "The Krishna Key" by Ashwin Sanghi
2025 Goal: Read 24 books and explore more non-fiction books
View my GoodreadsVideo Games: GTA 5, Black Myth Wukong, Elden Ring
Board Games: Scotland Yard, Catan, Backdoors and Breaches.
Platforms: CyberDefenders, HacktheBox, and TryHackMe
Favorite Challenges: Browser analysis, memory analysis, and malware analysis
Recent: Participated in WiCyS SANS CTF 2025
Digital: Learning Procreate on iPad and exploring digital illustration
Traditional: Sketching with pencils and experimenting with watercolors. Just started my artistic journey and loving the creative process of bringing ideas to life!