I am a Computer Science student with a profound interest in Cybersecurity, Cloud Computing, and recent technology trends. My passion lies in building and securing , scalable, and efficient systems that solve real-world problems. I enjoy applying my knowledge to hands-on projects and continuously learning from new challenges.
- Cloud & DevOps: AWS (Cognito, DynamoDB, Lambda, API Gateway, S3, CloudFront, Lex, SES, IAM, Amplify), Google Cloud, Oracle Cloud, Kubernetes, Docker, Terraform
- Cybersecurity: Network Security, Endpoint Security, IAM, Threat Intelligence, Incident Response, SIEM, Wireshark, Google Chronicle Security Operations
- Front-end Development: HTML, CSS, JavaScript, ReactJS
- Programming: C, C++, Python, Bash
- Operating Systems & Networking: Windows, Linux, Networking Basics
- Soft Skills: Problem-Solving, Critical Thinking, Adaptability, Communication, Attention to Detail
F13 Technologies | Virtual Internship | 3 Months
-
Gained hands-on expertise with a variety of AWS services, including Cognito, DynamoDB, Lambda, S3, API Gateway, Lex, and Amplify.
-
Strengthened front-end development skills using React JS.
-
Developed three key projects using AWS cloud services for the backend and integration.
-
Repository: AWS Cloud Internship Projects
Babli IT Consulting | Virtual Internship | 1 Month
- Conducted research and analysis on cybersecurity topics, including SIEM, SOC components, threat intelligence, and compliance frameworks.
- Investigated security incidents such as phishing attacks and malware persistence on Windows.
- Explored practical security tools like Netcat, packet sniffers, and honeypots for SOC operations.
- Analyzed DDoS mitigation techniques and digital forensics best practices.
- Managing Cloud Infrastructure with Terraform: Optimized cloud infrastructure by deploying Kubernetes clusters, configuring modular load balancing, and provisioning Cloud SQL instances. Enhanced traffic management with HTTPS content-based load balancers for secure and efficient routing.
- Kubernetes Cluster Management: Configured and managed Kubernetes clusters using Kubectl. Developed deployment pipelines and applied load balancing techniques.
- Security Analysis Report: Security Audit
- Network Traffic Analysis: Network-Traffic-Analysis
- Network Attacks Analysis: Network-Attack-Analysis
- Incident Report with NIST CSF: NIST-CSF
- Managing File Permissions in Linux: Linux-file-permissions
- Filtering Data from SQL Queries: SQL-Filter
- NIST SP 800-30 Rev. 1: NIST-SP-800-30-Rev.-1
- Incident Handler Journaling: Incident-handler-s-journal
- Updating files with a Python algorithm: File-update-Algorithm-with-Python
- Forage Profile:
- TATA Cybersecurity - IAM Developer Job Simulation:
- IAM strategy Assessment: IAM-strategy-Assessment
- Designing IAM solutions: Designing-IAM-Solutions
- Mastercard Cybersecurity Job Simulation:
- Phishing Awareness Presentation: Phishing-Awareness-Presentation
English | Marathi | Hindi | Konkani
Football, Singing, Guitar, Health & Fitness.