I'm a passionate and results-driven Cybersecurity Professional with a Master of Science in Cybersecurity (GPA 4.0/4.0) from the University of Maryland, Baltimore County. I'm dedicated to enhancing security posture, automating processes, and building robust, fault-tolerant systems. My expertise spans security engineering, software development, and network penetration testing, always with a keen eye on best practices for secure and efficient deployments.
π Currently seeking opportunities where I can apply my skills in cybersecurity, software development, and automation to contribute to innovative projects and secure critical infrastructure.
- CompTIA Security+
Splunk Nmap Nessus Sysmon Wireshark Atomic Red Team Active Directory
Relational Databases (SQL) JDBC RESTful Web Services JSON XML
Feb 2025 - May 2025
- π Developed a custom TypeScript step runner to enhance cryptographic verification chains, enabling secure root of trust integration and improving authentication integrity by 30% in decentralized identity systems
- π³ Configured Docker Compose for 4+ interdependent microservices across distributed Linux environments, improving fault-tolerant deployment workflows and reducing environment setup time by 25%
- π₯ Collaborated with a 5-person cross-functional team to integrate identity workflows into a browser extension, enabling upload of JSON/YAML configurations and improving client/credential provisioning speed by 40%
- π Built a secure JavaScript-based file upload module to execute identity verification workflows, improving user onboarding speed by 35% and enhancing usability of the self-sovereign identity system
June 2024 - August 2024
- π€ Developed a Python-based Slack bot that automated security advisory lookups across 8 Oracle Linux repos, reducing response time from 3-5 days to less than 24 hours and improving vulnerability triage efficiency by 80%
- π³ Containerized the security bot using Docker and implemented 50+ unit tests to achieve 95% code coverage, ensuring reliability and fault tolerance in cloud-based deployments
- π Built and deployed a Jenkins-based CI/CD pipeline integrated with Git, enabling 5+ automated builds/day and reducing manual test/deployment effort by 40%
- βοΈ Deployed bot on Linux cloud server with 99.9% uptime, securing secrets using environment variables to meet secure configuration and IAM best practices
- π Participated in migration testing and peer code review for Tenable Security Center, ensuring secure data transfer and OS compatibility in large-scale infrastructure upgrade from CentOS 7 to Oracle Linux 8
π Malware Reverse Engineering - Software Reverse Engineering (November 2024)
- π΅οΈ Reverse-engineered a malware sample using Ghidra, identifying its Command & Control (C2) server and analyzing its network communication protocol, socket connections, and message structures
- π¬ Examined malware functionality, including file operations, remote command execution, directory changes, and metadata exfiltration
- π Compiled findings into a detailed technical report, mapping behaviors to MITRE ATT&CK framework and recommending mitigation strategies
π€ Endpoint Detection and Response using Deep Learning - Deep Learning (May 2024)
- π§ Engineered a custom deep learning model for EDR using Python and TensorFlow
- π Achieved impressive performance metrics:
- Accuracy: 0.89
- Precision: 0.86
- Recall: 0.91
- F1-score: 0.88
π’ Enterprise Security Lab - Active Directory, Splunk, Atomic Red Team (August 2024)
- π₯οΈ Deployed Active Directory on Windows Server 2022 with organizational units and user policies
- π Configured Splunk with Sysmon and Universal Forwarders on Ubuntu for enhanced Windows endpoint visibility
- βοΈ Conducted adversary simulation using Atomic Red Team aligned with MITRE ATT&CK techniques
π Network Penetration Testing - Cyber Practitioner Development Lab (May 2024)
- π― Executed comprehensive penetration tests on 4 vulnerable machines
- π Identified and exploited high-risk vulnerabilities using Nmap and Nessus
- π» Successfully breached target systems by exploiting weak passwords, outdated software, and open ports
- π Produced detailed technical reports with remediation strategies
π Risk Assessment of Investment Firm - Risk Analysis and Compliance (December 2023)
- π¦ Conducted comprehensive risk assessment against New York DFS regulations
- π Created thorough risk register with 12 findings and remediation strategies
- π° Performed cost-benefit analyses and prioritized 5 very high-risk areas
π‘οΈ LLM-Based Firewall
A novel, AI-driven firewall that uses a fine-tuned Large Language Model to classify live network packets and detect intrusions in real-time.
π₯ Key Features:
- π‘ Live Packet Analysis: Developed a data pipeline using Python and Scapy to sniff, preprocess, and classify live network traffic for intrusion detection.
- π§ AI-Powered Detection: Leverages a 20-billion parameter model (
unsloth/gpt-oss-20b) to intelligently classify packets as safe or malicious. - π οΈ Custom Model Fine-Tuning: Fine-tuned on the industry-standard UNSW-NB15 dataset to create a highly specialized and efficient classifier.
- β‘ Efficient Performance: Utilized 4-bit quantization with Unsloth and PyTorch for high-speed, low-memory model inference.
π οΈ Tech Stack: Python, Scapy, PyTorch, Transformers, Unsloth, Pandas
π΅οΈ Web Security Scanner AI Agent
A multi-agent AI system that performs comprehensive security analysis of web applications using automated browser testing and intelligent vulnerability assessment.
π₯ Key Features:
- π€ Multi-Agent System: Constructed a system of specialized AI agents using CrewAI and NVIDIA models to automate web security assessments.
- π Automated Browser Testing: Integrated Selenium for live browser testing, allowing agents to analyze real-time network traffic and DOM data.
- π‘οΈ In-Depth Vulnerability Analysis: Assesses for critical frontend vulnerabilities including Cross-Site Scripting (XSS) and insecure Content Security Policies (CSPs).
- π Comprehensive Reporting: Consolidates findings from all agents into detailed reports with actionable remediation steps.
π οΈ Tech Stack: Python, CrewAI, NVIDIA AI, Selenium, Exa AI
A powerful multi-agent framework that automates and streamlines Open Source Intelligence (OSINT) gathering on corporate entities using a team of specialized AI agents.
π₯ Key Features:
- π€ 11 Specialized Agents: Orchestrated a framework using CrewAI to deploy a team of agents, each with a unique OSINT task.
- β‘ Parallel Processing: Agents work asynchronously to gather intelligence across multiple domains simultaneously for maximum efficiency.
- π Multi-Domain Analysis: Enabled agents with Exa Search to investigate network infrastructure, social media presence, and business data.
- π Automated Reporting: Culminates all findings into comprehensive and structured intelligence reports.
π οΈ Tech Stack: Python, CrewAI, Exa AI, Langchain
π MISP MCP Server
A Model Context Protocol (MCP) server that exposes MISP IOC retrieval functions to MCP-compatible clients like Claude Desktop.
π₯ Key Features:
- π Get Recent IOCs: Retrieve IOCs from last 24 hours
- π IOC Summary: Statistics and counts by IOC type
- π Filter by Type: Get IOCs by specific types (IP, domain, URL, etc.)
- πΎ Save to File: Export IOCs to JSON files
- π Connection Check: Verify MISP connectivity
π¬ I'm always open to discussing cybersecurity, software development, and innovative tech solutions!
βοΈ From sairambokka
"Securing the digital world, one line of code at a time" π‘οΈ



