SOC Analyst · VAPT Practitioner · Aspiring Security Engineer. I break things to understand them, then build defenses that last.
Covering the full spectrum — detect, exploit, and engineer.
Security tools and automation built from real-world scenarios
Automated post-exploitation breach detection by planting honey credentials across systems. Provides real-time alerts the moment stolen credentials are used in the wild — dramatically minimizing false positives and alert fatigue in SOC environments.
Collection of structured penetration testing lab writeups from TryHackMe and real-world bug bounty findings. Includes proof-of-concept exploits, CVSS scoring, and professional remediation documentation matching industry standards.
Custom incident response playbooks built from LetsDefend simulations — covering phishing triage, malware sandboxing workflows, brute-force detection, and lateral movement investigation with MITRE ATT&CK mappings.
Growing collection of Python scripts for security tasks — automated recon, log parsing, IOC extraction, and vulnerability scanning helpers. Designed to support both red team recon and blue team triage workflows.
Security is what I do. Hockey, leadership, and relentless drive are who I am.
Leading the college hockey team as captain (#17) and serving as elected Sports Secretary of ESEC — managing inter-college tournaments, team logistics, and college-wide sports operations. The same leadership that wins matches drives how I handle incidents.
Inter-college hockey champion — discipline, strategy, and team leadership forged on the field and applied everywhere else.
Marathon runner and calisthenics practitioner — the mental grit that fuels long runs keeps me sharp at 3AM SOC shifts.
Atomic Habits · 48 Laws of Power · Rich Dad Poor Dad — books that shape how I think, compete, and grow daily.
There's a lot more to the story than skills and projects.
Open to SOC Analyst, VAPT / Penetration Testing, and Security Engineer roles. Always up for a conversation about security.
SOC Operations · Threat Detection · Web App Pentesting · Bug Bounty · Security Tooling · Incident Response
Download Resume ↓