ANISH KUMAR VEDANT

Aspiring Cybersecurity Analyst

Passionate about securing digital landscapes and protecting against cyber threats.

Let's Connect

About Me

I am a highly driven and dedicated cybersecurity enthusiast passionate about safeguarding digital assets and combating cybercrime. As a Master's student at the University of New Haven, I specialize in cybersecurity and networks with a focus on penetration testing, vulnerability assessments, and incident response. My expertise, honed through certifications like Red Hat System Administration, Introduction to Python for Cybersecurity, Foundations of Cybersecurity, and Ethical Hacking, enables me to build robust security solutions that ensure the confidentiality, integrity, and availability of critical information.

With a background in ethical hacking, I leverage tools like Metasploit, Wireshark, Nmap, John the Ripper, and Hydra to identify and mitigate vulnerabilities proactively. My web development experience allows me to integrate security best practices seamlessly into the development lifecycle, ensuring resilient and secure web applications.

I am well-versed in using machine learning algorithms to analyze network traffic and user behavior, enhancing the proactive detection and mitigation of cyber threats. As a network architect with 500+ connections, I seek collaborations that fuel innovation in the cybersecurity landscape.

Committed to continuous learning, I actively pursue ongoing education and certifications to stay ahead in the dynamic cybersecurity field. I am currently seeking opportunities to apply my skills and knowledge to protect organizations from evolving cyber threats. My technical proficiency includes Python, Metasploit, Wireshark, and SIEM tools, and I am dedicated to making a significant impact in the fight against cybercrime.

Currently, I am seeking internship opportunities where I can apply my skills and knowledge to protect organizations from evolving cyber threats.

Projects

Project 1

This project demonstrates techniques for gathering system and network information, capturing user activity, and encrypting data. It includes encryption and decryption scripts that use AES symmetric encryption. The project is designed for educational purposes only. View Project

Project 1

This Python project demonstrates end-to-end encryption (E2EE) using the x25519 key exchange protocol and AES encryption for secure communication between a client (Alice) and a server (Bob) over a socket connection. View Project

Experience

IoT Engineer & Cybersecurity Specialist, Intern at Peak Power Consultancy

July 2022 - June 2023 Thane, Maharashtra

  • During my tenure at Peak Power Consultancy, I spearheaded a transformative project centered on real-time Human-Machine Interface (HMI) connectivity. Our team, aimed to revolutionize the monitoring capabilities of electric vehicle power systems. We designed a custom power metering and fault detection circuit, seamlessly integrated with the ESP32 microcontroller via Controller Area Network (CAN) communication. This circuitry facilitated monitoring of vehicle parameters such as voltage, current, and temperature, enhancing efficiency by 25%.
  • Beyond hardware design, I developed a robust and dynamic web application for real-time data presentation. Prioritizing security, I incorporated best practices for secure coding and data handling, ensuring our web interface dynamically updated key Electric Vehicle (EV) metrics, thereby boosting user engagement by 30%.
  • Leveraging my deep learning expertise, particularly the Long Short-Term Memory (LSTM) model, I engineered an algorithm for remote battery health monitoring via a secure web server. This algorithm significantly improved accuracy in battery health assessments by 35%, showcasing the synergy between machine learning and cybersecurity.
  • To ensure seamless and secure data transmission and storage, we implemented robust MQTT protocols for data transfer to Amazon Web Services (AWS). Our cloud-based storage solution enhanced data accessibility by 40%, integrating strong encryption and access controls to safeguard sensitive information.
  • A critical aspect of the project was the fortification of our web application's security and protection mechanisms. I conducted regular security audits, identified potential vulnerabilities, and implemented necessary patches and updates. This proactive approach to cybersecurity reduced our system’s vulnerability by 50%, ensuring robust protection against potential threats.
  • Tools & Technologies: ESP32, CAN, MQTT, AWS, Python, HTML/CSS & Js, Heroku, Tensorflow, Flask, MySQL, Adafruit IO, Postman, Jupyter Notebook, Arduino IDE, Visual Studio Code, Git, GitHub
  • Cybersecurity tools: NMap, OpenSSL, Let's Encrypt, Burp Suite, Wireshark, Snort, AES, SHA, SSL/TLS, Kali linux, PGP, AWS IAM (Identity and Access Management)
  • This experience allowed me to seamlessly bridge hardware and software, culminating in a real-time connectivity solution for critical monitoring needs. Our project was a resounding success, combining innovation with practicality to achieve tangible results. Our efforts led to a remarkable improvement in monitoring and efficiency within the organization while significantly strengthening our cybersecurity posture.

Skills

Languages

Python
C/C++
PowerShell & Bash scripting
HTML, CSS & JS, PHP
MySQL, MongoDB
React
Kotlin

Libraries

NumPy, Pandas, Matplotlib, Seaborn, Plotly
Scikit-learn, TensorFlow, Keras NLTK
OpenCV, Pillow
Requests, Sockets, Pickle
Beautiful Soup,Tkinter, pycrypto
pygame, keyboard
sqllite, OS, subprocess

Frameworks

Flask & Django
Node.js, React, Express & Bootstrap
Heroku & Docker
Streamlit
Selenium
Scrapy
Postman

Cybersecurity Tools & Concepts

CCNA, Network security & Netflow
AES, PGP, OpenSSL, Let’s Encrypt
Wireshark, Nmap, Tcpdump, Snort, Burp Suite
Metasploit, John the Ripper, SQLMap, Hydra, Nikto, Aircrack-ng
SSL/TLS, Intrusion Detection System, Cryptography & Data security
Red Hat System Administration Course, PowerShell, CLI (Command Line Interface), Kali Linux
Web Applications Security, Ethical Hacking, Incident Response, Risk Assessment, Network Security & Firewalls

Other

Git & GitHub, Vmware
Database Management System
Cyber-Physical Systems
Data Analysis & Data Visualization, Time Series Analysis
Recommender Systems, Internet of Things (IoT), Computer Vision
AWS IAM (Identity and Access Management) & AWS KMS (Key Management Service)
Machine Learning, Deep Learning , Transfer Learning, Reinforcement Learning, Generative Adversarial Networks (GANs), Neural Networks, Natural Language Processing (NLP)

Cloud Services

AWS
Google Cloud
Docker

Education

Masters in Cybersecurity and Networks

Aug 2023 - May 2025

University of New Haven, West Haven | GPA: 3.83

Coursework: Introduction to Programming: C, Intermediate Programming: C/C++, Computer Networks and Data Communication,Operating System, Introduction to Cyber Forensic Science, Introduction to Computer Security, Introduction to Script Programming: Python, Cryptography and Data Security, Unix Network Administration, Enterprise Network Design, Ethical Hacking.

Bachelors in Electrical Engineering

Aug 2019 - May 2023

St. Francis institue of technology, Mumbai | GPA: 8.20

Coursework: C Programming, Python Programming, Electric and Hybrid Vehicles, Renewable Energy Sources, Control System, Microcontroller Applications, Signals & System, Electric Traction, Electric Drives & Control, Internet of Things (IoT), Artificial intelligence and machine learning, Cybersecurity & laws, Electrical Power System, Electric Vehicles system design

Courses

  • Red Hat System Administrator II (RH134)

    Red Hat

    Issued June 2024

    Skills: Red Hat Enterprise Linux (RHEL), Command line, Bash scripting, Secure Shell (SSH), Network Security, Password Management, Dynamic Host Configuration Protocol (DHCP), DNA Extraction, Analytical Skills, Hacking, Secure Remote Access

    Certificate of Attendance (RH134-9.0)
  • Red Hat System Administrator I (RH124)

    Red Hat

    Issued May 2024

    Skills: Bash scripting, Storage Resource Management, logs, SELinux, Disk Encryption, Network-Attached Storage (NAS), Enterprise Network Security, Network Administration, Virtual Private Network (VPN), Storage Area Network (SAN)

    Certificate of Attendance (RH124-9.0)
  • Introduction to Python for Cybersecurity

    InfoSEC

    Issued December 2023

    Skills: Computer Programming, Cybersecurity, Python (Programming Language), Pre-attack, Attack & Defend, Socket Programming, Ethical Hacking Fundamentals, Penetration Testing Tools, Security Scripting, Network Analysis Basics

    Show Credential
  • Foundations of Cybersecurity

    Google

    Issued December 2023

    Skills: Cybersecurity, Security Information and Event Management (SIEM) tools, SQL, Linux, Intrusion Detection Systems (IDS), Python Programming, NIST, Network Fundamentals, Cryptography Basics, Incident Response, Risk Management, Security Auditing

    Show Credential
  • Ethical Hacking

    Internshala Trainings

    Issued September 2021

    Skills: Cyber Defense, Cyberlaw, Cybersecurity, Penetration Testing, Web Application Security, Network Scanning

    Show Credential
  • Machine learning and IoT

    St. Francis Institute Of Technology

    Issued June 2021

    Skills: Internet of Things (IoT), Machine Learning, Data Analysis, Sensor Networks, Python for IoT

    Show Credential
  • Python Data Structures

    Coursera

    Issued May 2020

    Skills: Data Analysis, Data Structures, NumPy, Databases, Python, Tuple, Python Syntax And Semantics

    Show Credential
  • Python for Everybody Specialization

    Coursera

    Issued April 2020

    Skills: Python, Database Management System (DBMS), XML, JSON, Web Scraping, API Interactions

    Show Credential

Publications

  • The paper proposes an intrusion detection system (IDS) employing a decision tree for classifying different types of cyber attacks launched on the CPPS. The evaluation metrics such as accuracy, precision, recall, and F1 score are computed for different types of cyber attacks to show the effectiveness of the proposed IDS. Finally, from the results, it can be claimed that the proposed IDS is successful in identifying the various cyber attacks on CPPS in different test scenarios.

  • This paper discusses the critical role of transformers in the electrical power network and the importance of monitoring and examining them to prevent irreversible damage. The focus is on monitoring the dielectric properties of the transformer's oil coolant, which are essential for its longevity. To achieve this, the paper proposes a transformer monitoring system using machine learning techniques, specifically evaluating classifiers like the random forest, support vector machine (SVM), k-nearest neighbors (kNN), and logistic regression for detecting both low and high oil temperatures. The study highlights the influence of different load conditions on oil temperature and concludes that kNN exhibits superior performance compared to random forest, SVM, and logistic regression, as evidenced by evaluation metrics.

  • This paper discusses the significance of Vehicle-to-Grid (V2G) technology, which enables the secure exchange of information and energy between electric vehicles (EVs) and the grid. It emphasizes the need for confidentiality and privacy during this exchange. The paper proposes the use of blockchain technology, specifically a Practical Byzantine Fault Tolerance (PBFT) consensus mechanism, to ensure the security of energy trading between EVs and the grid. Testing the PBFT-based V2G system in various scenarios demonstrates its effectiveness in safeguarding this crucial energy exchange process.

Achievements

  • First Place, Research Excellence

    Issued by IEI NMLC FCRIT · June 2023

    I was awarded first place in the Research Excellence (Undergraduate Student - Regional) category at the IEI NMLC FCRIT Excellence Awards 2023. This achievement is a culmination of my dedication and hard work, including participation in various projects and the publishing of three research papers in IEEE journals. I am honored to have received this recognition for my contributions to the engineering field and look forward to continued growth in my academic and research endeavors.

  • First Place, Electrical Symposium 2023

    Issued by Electrical Department · April 2023

    Associated with St. Francis Institute Of Technology. Secured First Place in the Electrical Symposium held on April 13, 2023, at St. Francis Institute of Technology, Borivali. The award is in recognition of my project related to Electric Vehicles (EV). I am currently working on publishing a paper based on this project, which played a pivotal role in securing this prestigious accolade.

Volunteering

  • Head of community outreach at ISC

    January 2024 - Present | University of New Haven

    • Lead community outreach efforts, including generating QR codes for membership recruitment and event information dissemination. Collaborate with various council members to collect feedback, support diversity initiatives, and ensure efficient communication channels. Collecting attendance at meetings and events hosted by ISC. Collect member feedback to plan events and respond to both emails and social media messages.
  • Orientation Leader at OGISL

    January 2024 · 1 mo | University of New Haven

    • As an Orientation Support Staff Leader during the spring break at the University of New Haven, I led a team dedicated to welcoming and guiding incoming students during the spring orientation. Our mission was to ensure that new students felt supported, informed, and empowered as they transitioned into university life. Through organizing and coordinating orientation activities, providing valuable information about campus resources, and fostering a welcoming environment, we aimed to set the stage for a successful academic journey for our incoming students. It was a rewarding experience contributing to the positive start of their university experience.

Interests

  • Capture the Flag (CTF) Competitions

    Actively participating in CTF challenges to hone my skills in cybersecurity, cryptography, and network security.

  • Learning New Programming Languages

    Focused on mastering languages critical to cybersecurity, such as Python for scripting and automation, JavaScript for understanding web vulnerabilities, and C for low-level system security.

  • Cybersecurity Advancements

    Keeping abreast of the latest cybersecurity trends and advancements by regularly reading industry publications, attending webinars, and participating in forums. I spend my free time researching and experimenting with new tools and techniques, particularly in areas like threat intelligence, cloud security, and AI-powered security solutions.

  • Open Source Security Projects

    Contributing to open-source security projects and tools on platforms like GitHub to improve my practical skills and give back to the community.