Securing systems. Defending people. Enabling trust.
Cybersecurity Engineer specializing in security operations, compliance frameworks, and threat defense — building resilient postures across identity, endpoint, cloud, and data layers.
I'm a Cybersecurity Engineer at Class Valuation, an appraisal management company with 500+ users. My work spans the full security lifecycle — from architecting defenses to building the compliance programs that keep organizations audit-ready.
With a Master's in Information Assurance and Cybersecurity from Florida Institute of Technology, I bring deep technical fluency across network security, cyber forensics, and enterprise security operations.
When I'm not hardening infrastructure, I explore creative Python projects — building animated visual tools and image-processing pipelines. I believe the precision that makes great security engineering also makes great creative work.
Leading security operations, compliance, and vendor risk management for a 500+ user enterprise. Architecting controls across cloud, endpoint, and email surfaces while maintaining audit readiness across SOC 2, ISO 27001, and NIST frameworks.
Security research focused on DNS hardening, cryptographic implementations, and malware analysis for cyber threat intelligence.
3 years of hands-on network security engineering across proxy, WAF, firewall, and MDM technologies for enterprise clients across India and the Middle East.
End-to-end SecOps — threat monitoring, incident detection and response, alert triage, and SIEM management across complex enterprise environments.
Designing and executing compliance programs aligned to SOC 2 Type II, ISO 27001, and NIST CSF — including audit prep, gap analysis, and control implementation.
Implementing zero-trust principles, access control policies, privileged access management, and user access reviews to minimize the blast radius of credential compromise.
Configuring and managing network security controls including Zscaler proxy rules, SSL inspection, URL filtering, and DNS security across hybrid environments.
Deploying and tuning email security platforms, running phishing simulation campaigns, and building security awareness programs that measurably reduce click rates.
Authoring security policies (AUP, BYOD, AI Usage, DLP) and conducting third-party risk assessments with formal risk scoring matrices and remediation tracking.
Developed, exploited, and mitigated a custom e-commerce website by performing security analysis on SQL injection, XSS injection, SSTI (server-side template injection), and DoS attacks.
View on GitHub →Expanded the open-source Volatility3 hash dump plugin by integrating the hashes.com API to fetch cracked passwords directly from memory images. 98% accurate and 100% time effective.
View on GitHub →Automated VM creation and memory analysis tool that streamlines forensic workflows — from spinning up isolated virtual environments to running full memory acquisition and Volatility3 analysis pipelines with a single command.
View on GitHub →Analyzed network traffic and exploited vulnerabilities in 3 consumer IoT devices — smart plug, IP camera, and lightbulb — by crafting 1000+ packets with Scapy. Identified encryption and authentication flaws, reducing effective security by 70% against attacks.
Research paper exploring the impact of simulated learning environments and interactive tutorials on student performance and anxiety reduction in cybersecurity courses. Published in INTED2025 Proceedings (Pages 1775–1784), Valencia, Spain — March 2025.