I'm a passionate and results-driven Cybersecurity Professional with a Master of Science in Cybersecurity (GPA 4.0/4.0) from the University of Maryland, Baltimore County. I'm dedicated to enhancing security posture, automating processes, and building robust, fault-tolerant systems. My expertise spans security engineering, software development, and network penetration testing, always with a keen eye on best practices for secure and efficient deployments.
🔍 Currently seeking opportunities where I can apply my skills in cybersecurity, software development, and automation to contribute to innovative projects and secure critical infrastructure.
- CompTIA Security+
Splunk Nmap Nessus Sysmon Wireshark Atomic Red Team Active Directory
Relational Databases (SQL) JDBC RESTful Web Services JSON XML
Feb 2025 - May 2025
- 🔐 Developed a custom TypeScript step runner to enhance cryptographic verification chains, enabling secure root of trust integration and improving authentication integrity by 30% in decentralized identity systems
- 🐳 Configured Docker Compose for 4+ interdependent microservices across distributed Linux environments, improving fault-tolerant deployment workflows and reducing environment setup time by 25%
- 👥 Collaborated with a 5-person cross-functional team to integrate identity workflows into a browser extension, enabling upload of JSON/YAML configurations and improving client/credential provisioning speed by 40%
- 📁 Built a secure JavaScript-based file upload module to execute identity verification workflows, improving user onboarding speed by 35% and enhancing usability of the self-sovereign identity system
June 2024 - August 2024
- 🤖 Developed a Python-based Slack bot that automated security advisory lookups across 8 Oracle Linux repos, reducing response time from 3-5 days to less than 24 hours and improving vulnerability triage efficiency by 80%
- 🐳 Containerized the security bot using Docker and implemented 50+ unit tests to achieve 95% code coverage, ensuring reliability and fault tolerance in cloud-based deployments
- 🔄 Built and deployed a Jenkins-based CI/CD pipeline integrated with Git, enabling 5+ automated builds/day and reducing manual test/deployment effort by 40%
- ☁️ Deployed bot on Linux cloud server with 99.9% uptime, securing secrets using environment variables to meet secure configuration and IAM best practices
- 🔄 Participated in migration testing and peer code review for Tenable Security Center, ensuring secure data transfer and OS compatibility in large-scale infrastructure upgrade from CentOS 7 to Oracle Linux 8
🔍 Malware Reverse Engineering - Software Reverse Engineering (November 2024)
- 🕵️ Reverse-engineered a malware sample using Ghidra, identifying its Command & Control (C2) server and analyzing its network communication protocol, socket connections, and message structures
- 🔬 Examined malware functionality, including file operations, remote command execution, directory changes, and metadata exfiltration
- 📊 Compiled findings into a detailed technical report, mapping behaviors to MITRE ATT&CK framework and recommending mitigation strategies
🤖 Endpoint Detection and Response using Deep Learning - Deep Learning (May 2024)
- 🧠 Engineered a custom deep learning model for EDR using Python and TensorFlow
- 📈 Achieved impressive performance metrics:
- Accuracy: 0.89
- Precision: 0.86
- Recall: 0.91
- F1-score: 0.88
🏢 Enterprise Security Lab - Active Directory, Splunk, Atomic Red Team (August 2024)
- 🖥️ Deployed Active Directory on Windows Server 2022 with organizational units and user policies
- 📊 Configured Splunk with Sysmon and Universal Forwarders on Ubuntu for enhanced Windows endpoint visibility
- ⚔️ Conducted adversary simulation using Atomic Red Team aligned with MITRE ATT&CK techniques
🔓 Network Penetration Testing - Cyber Practitioner Development Lab (May 2024)
- 🎯 Executed comprehensive penetration tests on 4 vulnerable machines
- 🔍 Identified and exploited high-risk vulnerabilities using Nmap and Nessus
- 💻 Successfully breached target systems by exploiting weak passwords, outdated software, and open ports
- 📋 Produced detailed technical reports with remediation strategies
📊 Risk Assessment of Investment Firm - Risk Analysis and Compliance (December 2023)
- 🏦 Conducted comprehensive risk assessment against New York DFS regulations
- 📋 Created thorough risk register with 12 findings and remediation strategies
- 💰 Performed cost-benefit analyses and prioritized 5 very high-risk areas
A novel, AI-driven firewall that uses a fine-tuned Large Language Model to classify live network packets and detect intrusions in real-time.
🔥 Key Features:
- 📡 Live Packet Analysis: Developed a data pipeline using Python and Scapy to sniff, preprocess, and classify live network traffic for intrusion detection.
- 🧠 AI-Powered Detection: Leverages a 20-billion parameter model (
unsloth/gpt-oss-20b) to intelligently classify packets as safe or malicious. - 🛠️ Custom Model Fine-Tuning: Fine-tuned on the industry-standard UNSW-NB15 dataset to create a highly specialized and efficient classifier.
- ⚡ Efficient Performance: Utilized 4-bit quantization with Unsloth and PyTorch for high-speed, low-memory model inference.
🛠️ Tech Stack: Python, Scapy, PyTorch, Transformers, Unsloth, Pandas
A multi-agent AI system that performs comprehensive security analysis of web applications using automated browser testing and intelligent vulnerability assessment.
🔥 Key Features:
- 🤖 Multi-Agent System: Constructed a system of specialized AI agents using CrewAI and NVIDIA models to automate web security assessments.
- 🌐 Automated Browser Testing: Integrated Selenium for live browser testing, allowing agents to analyze real-time network traffic and DOM data.
- 🛡️ In-Depth Vulnerability Analysis: Assesses for critical frontend vulnerabilities including Cross-Site Scripting (XSS) and insecure Content Security Policies (CSPs).
- 📄 Comprehensive Reporting: Consolidates findings from all agents into detailed reports with actionable remediation steps.
🛠️ Tech Stack: Python, CrewAI, NVIDIA AI, Selenium, Exa AI
A powerful multi-agent framework that automates and streamlines Open Source Intelligence (OSINT) gathering on corporate entities using a team of specialized AI agents.
🔥 Key Features:
- 🤖 11 Specialized Agents: Orchestrated a framework using CrewAI to deploy a team of agents, each with a unique OSINT task.
- ⚡ Parallel Processing: Agents work asynchronously to gather intelligence across multiple domains simultaneously for maximum efficiency.
- 📊 Multi-Domain Analysis: Enabled agents with Exa Search to investigate network infrastructure, social media presence, and business data.
- 📝 Automated Reporting: Culminates all findings into comprehensive and structured intelligence reports.
🛠️ Tech Stack: Python, CrewAI, Exa AI, Langchain
A Model Context Protocol (MCP) server that exposes MISP IOC retrieval functions to MCP-compatible clients like Claude Desktop.
🔥 Key Features:
- 📅 Get Recent IOCs: Retrieve IOCs from last 24 hours
- 📊 IOC Summary: Statistics and counts by IOC type
- 🔍 Filter by Type: Get IOCs by specific types (IP, domain, URL, etc.)
- 💾 Save to File: Export IOCs to JSON files
- 🔗 Connection Check: Verify MISP connectivity
⭐️ From sairambokka
"Securing the digital world, one line of code at a time" 🛡️



