whoami$ cat ~/about.txt
Research Intern @ IIT Madras (CyStar Club) β building defensive systems at the intersection of SIEM automation, applied ML, and threat intelligence.
Iβm a CSE (Cybersecurity) undergrad at Sri Krishna College of Engineering and Technology, Coimbatore (CGPA: 8.69). I spend my time turning security problems into production-grade defenses β configuring Wazuh Active Response, engineering anomaly-detection models, and hunting web-app vulnerabilities responsibly. Proud Winner of Smart India Hackathon 2025 (Hardware Edition).
π§ ML-Based Network Anomaly DetectionHybrid pipeline combining Isolation Forest (statistical outliers) with LSTM (temporal sequence modeling) for multi-day network log analysis. Integrated with Wazuh for SOC workflow alignment and deployed via Docker with MCP server hooks.
|
π Rasa Detection ML Model β SIH 2025 WinnerMachine learning model for Rasa (taste) detection using electronic tongue (E-Tongue) sensor arrays. Awarded Winner at Smart India Hackathon 2025 (Hardware Edition) β national-level recognition for applied ML solving a real-world sensing problem.
|
π‘οΈ Mini-SOC Simulation & APT DetectionLocalized Security Operations Center lab simulating real-world defensive workflows. Integrated Suricata IDS and Splunk SIEM to ingest network logs and PCAP data for deep packet analysis and APT behavior detection.
|
βοΈ Automated CVE Monitoring PipelineProactive threat intelligence tool that scrapes real-time vulnerability data from official CVE databases. Python automation filters high-severity updates and delivers instant email alerts via cron-scheduled Docker containers.
|
- role: Research Intern
company: IIT Madras β CyStar Club
period: Feb 2026 β Present
stack: [Wazuh, OpenSearch, RAG, Docker, MCP, Python]
impact: "Automated real-time threat mitigation via Wazuh Active Response;
built ML anomaly detection deployed in Docker with MCP integration."
- role: Cybersecurity Research Intern
company: Lexcyberwall
period: May 2024 β Present
stack: [Burp Suite, OWASP, VAPT]
impact: "Identified & responsibly disclosed multiple IDOR/BOLA vulnerabilities
and sensitive data exposure on production web applications."
- role: Security Audit Intern
company: Kultivate India Pvt. Ltd.
period: May 2025 β Jun 2025
stack: [AWS, 3-tier architecture, Security Auditing]
impact: "Performed authorized production audits; deployed 3-tier architecture
on AWS; collaborated with dev teams at internal hackathon."
Continuously sharpening practical skills through TryHackMe rooms covering offensive security, SOC operations, digital forensics, and blue-team workflows. Maintaining a curated library of SOC Playbooks and a Linux DFIR Toolkit reference for incident-response muscle memory.
Open to cybersecurity research opportunities, SOC / Blue Team roles, and ML-driven defense collaborations.
$ echo "Trust is a vulnerability. Verify everything."
/dev/curiosity Β· Last updated 2026