B.Tech (Electronics and Communication Engineering)
Faculty of Engineering and Technology, Jamia Millia IslamiaResearch Engineer
TCS Research, IITDHyperLedger trainer
BlockskilloWeb3 Game Developer
Replit BountyFrontend Developer
Akash Console(Open Source) | BountyAkash Network - a decentralized cloud platform
Full Stack Developer
Freelance | Gatsby, ChakraUI and SupabaseCyberSecurity Administrator
Intern at Virtually Testing FoundationIt was an 8-week program where every week I learned about different topics namely - MITRE ATT&CK framework, Vulnerability and Log/SIEM management (Splunk), OSINT, Container Security, Cryptography, Cloud Security, OWASP Top 10 security, and Active directory. I was required to do a demo of some practical skills and create presentations every week on those topics.
Cloud Computing
Successfully completed the 30DaysOfGoogleCloud Program by GCloud where I learned basic things like deploying VM instances and cloud storage buckets, building a Docker image, doing the analysis of terabytes of data using Bigquery, and more things like leveraging industrial applications using machine learning APIs from Google Cloud like Cloud NLP, OCR, Image analysis for location detection, face detection, Video intelligence, audio to text, etc.,
KDE
Flatpaks PackagerContributed to Open Source Community KDE in packaging KDE applications into Flatpaks for Flathub.
Ethereum Blockchain trainer
BlockskilloCreated learning materials and guided practices which can train a newcomer to become a blockchain developer.
Grant from Ethereum Ecosystem Support Program
Ethereum FoundationGitcoin Eth Infra Grantee (GG-19)
GitcoinEthereum Protocol Fellowship
Ethereum FoundationPenetration Testing: Advanced Web Testing
LinkedIn LearningLearnt enumerating endpoints of a website by contextual or dictionary-based fuzzing, identifying virtual websites, integrating Burp Suite and sqlmap to enable deep testing of a website for hidden access vectors, directory traversal, escalating HTML injection into a reverse-shell using Metasploit and exploiting CMS.