Home

Security+ certified cybersecurity engineer focused on practical defense.

I am a recent MS Cybersecurity and Networks graduate with around 2 years of experience working in cybersecurity across internships, research roles, and hands on labs. I like to learn by doing and move between building secure networks, simulating attacks, analyzing logs, and writing clear explanations so others can repeat the work.

My background starts in electrical engineering and IoT where I spent a year as a student intern at Peak Power Consultancy building real time EV monitoring on ESP32 and CAN. That grew into intrusion detection for cyber physical power systems and secure energy systems as an undergraduate researcher, which led to three IEEE indexed publications and a regional Research Excellence award. Today I am a Graduate Research Assistant at the University of New Haven working with Prof. Shivanjali Khare on a literature driven study of GPU security across vendors like NVIDIA and AMD.

On the cybersecurity side I run a homelab with Pi hole and Unbound, WireGuard and VPNs, pfSense, Security Onion, Wazuh, phishing simulation, and Active Directory style labs. I stay active on CTF platforms, including BSides Pros v Joes, TryHackMe, and Hack The Box, practice offensive skills with tools like Nmap, Burp Suite, Metasploit, and Caldera, and keep my defensive skills sharp through log analysis and incident response themed labs.

20+
Security projects and labs
DNS firewalls, VPN setups, phishing labs, scripting, and research driven security experiments.
15+
CTFs and challenges
From BSides events and internal CTFs to TryHackMe and Hack The Box style targets.
3
IEEE publications
Cyber physical power system intrusion detection, transformer monitoring, and blockchain for vehicle to grid.
5+
Leadership roles
Graduate councils, student communities, outreach, and orientation work that keeps everything human.

I like roles where I can keep building practical security tools and workflows, tuning detections, and helping teams understand why a finding actually matters. The rest of this portfolio breaks down that story into experience, skills, projects, and proof through certifications and achievements.

Experience & Skills

Engineering, security, and hands on execution.

Experience & leadership
Graduate Research Assistant
University of New Haven · Sep 2025 to Present · West Haven, Connecticut

Working with Prof. Shivanjali Khare on an in depth, literature based project that compares how GPU security has evolved across major vendors like NVIDIA and AMD.

  • Review academic research, public vulnerability disclosures, and vendor documentation to understand real world GPU attacks, vulnerabilities, and security guardrails.
  • Build comparative tables that connect hardware features, firmware protections, and software controls with practical attack scenarios and mitigations.
  • Use Python, spreadsheets, and reference managers to systematically track sources, extract key technical details, and avoid duplicate or biased data.
  • Regularly summarize interim insights for my advisor and support a research paper that highlights trends, gaps, and future directions in GPU security for academic and industry readers.
Graduate leadership, student engagement, and support roles
University of New Haven · 2023 to 2025

Combined technical work with leadership and service roles that strengthened my communication, documentation, and community building skills.

  • Served as Vice President of Public Relations for the Graduate Student Council, leading creative marketing, branding, social media, and event documentation for graduate students.
  • Worked as a Campus Connector and Orientation Support staff with the Office of Graduate and International Student Life, helping incoming students with onboarding, campus tours, and resource navigation.
  • Supported the Office of Graduate Admissions as a Graduate Assistant, securing time sensitive application workflows in Slate, verifying academic records, and applying access control and data integrity best practices.
  • Led community outreach for the Indian Student Council and volunteered as an event photographer, supporting large cultural events such as Diwali and helping create a welcoming campus experience.
Cybersecurity and IoT Engineer, Intern
Peak Power Consultancy Pvt Ltd · Jul 2022 to Jun 2023 · Thane, India

Worked on an end to end EV monitoring stack that combined embedded hardware, web development, cloud services, and security controls for real time power system monitoring.

  • Designed a custom power metering and fault detection circuit around an ESP32 using CAN to track voltage, current, temperature, and fault states.
  • Built and secured a Flask based dashboard and API for live EV telemetry using input validation, authentication checks, and safe session handling so it could be used as an internal engineering tool.
  • Implemented an LSTM based battery health model and exposed it via a secure Flask API with basic anomaly checks and alerts for remote monitoring.
  • Hardened an MQTT and AWS pipeline with TLS, certificate based device identity, and least privilege IAM roles for topics, storage, and APIs so live and historical data could be accessed without exposing raw endpoints.
  • Acted as security owner using Nmap, OpenSSL, Burp Suite, and Snort to review services, test for common web vulnerabilities, and define simple runbooks for login failures, unusual IP ranges, and traffic spikes.
Undergraduate Student Researcher
St. Francis Institute of Technology · Part-time · May 2022 to Oct 2022 · Mumbai, Maharashtra, India · On-site

Undergraduate research role focused on applying machine learning and blockchain to cyber physical power systems and secure energy trading, resulting in three IEEE indexed publications at the 2022 Global Energy Conference (GEC) in Batman, Turkey.

  • Co-designed and implemented a machine learning based intrusion detection system for a cyber physical power system using decision trees to detect multiple cyber attack types, evaluated with accuracy, precision, recall, and F1 score.
  • Developed a transformer oil temperature monitoring model from load and operating data, benchmarking kNN, random forest, SVM, and logistic regression and showing kNN as the best classifier for low vs high oil temperature.
  • Contributed to the design and simulation of a PBFT style blockchain framework to secure Vehicle to Grid (V2G) energy trading, focusing on transaction integrity, confidentiality, and privacy.
  • Owned end to end research workflows including literature review, model and system design, dataset preparation, coding and simulation, experiment analysis, and writing camera ready manuscripts accepted and published on IEEE Xplore under author profile “A. Vedant.”
Education
MS in Cybersecurity and Networks
University of New Haven · GPA 3.83 · Aug 2023 to May 2025

Graduate program focused on offensive security, blue team operations, network engineering, and secure systems, with a strong emphasis on labs, projects, and community involvement.

  • Coursework across ethical hacking, cryptography and data security, digital forensics, incident response, Unix and Linux administration, enterprise network design, security architecture, and scripting for automation.
  • Built and maintained homelabs with Pi hole, Unbound, WireGuard, pfSense, Security Onion, Wazuh, phishing simulation, Active Directory style labs, and Python based automation for log parsing, data collection, and attack simulation.
  • Graduate Research Assistant working with Prof. Shivanjali Khare on a literature driven study of GPU security across vendors like NVIDIA and AMD, connecting academic papers, vendor documentation, and real world vulnerabilities into a structured security view.
  • Held multiple leadership and service roles including Vice President of Public Relations for the Graduate Student Council, Campus Connector, and community outreach work with the Indian Student Council, strengthening communication and technical storytelling skills.
  • Recognized with the Distinguished Service Award from the Office of Graduate & International Student Life for sustained contributions to the graduate student community.
BE in Electrical Engineering
St Francis Institute of Technology · Grade 8.13 · Aug 2019 to May 2023

Electrical engineering degree that combined power systems, embedded systems, IoT, and software, and laid the foundation for later work in cyber physical and cybersecurity domains.

  • Coursework in power systems, automation and control, cyberlaw, computer programming, databases, operating systems, artificial intelligence and machine learning, and energy systems, giving a strong technical base across both hardware and software.
  • Worked as an undergraduate researcher on cyber physical power systems and secure energy systems, leading to three IEEE indexed conference papers on intrusion detection, transformer monitoring, and a PBFT blockchain for secure vehicle to grid energy trading.
  • Led and contributed to multiple applied projects, including IoT and automation builds and ML based energy and recommendation systems that connected theory with practical implementations.
  • Awarded first place in the Research Excellence (Undergraduate Student Regional) category at the IEI NMLC FCRIT Excellence Awards 2023, and first place at the Electrical Symposium 2023 for research and project work.
  • Active member of IEEE and the Electrical Engineering Students Association, often helping with technical events, photography, and documentation, and building early experience in presenting technical work to mixed audiences.
Technical skills
Security operations and blue team

Experience reading and correlating logs, working with detection tools, and simulating SOC workflows from alert triage through containment and follow up.

SIEM concepts Security Onion Wazuh Snort / IDS Log analysis Packet capture Wireshark Tcpdump Incident response Phishing analysis NIST basics Disk encryption Network security implementation Security monitoring Linux log forensics
Offensive security and CTF

Use offensive tooling to understand attacker workflows and then translate those paths into better detections, hardening steps, and playbooks.

Nmap Burp Suite Metasploit SQLMap Hydra John / Hashcat Kali Linux Pre attack recon Web app security Credential attacks Privilege escalation basics CTFs & labs Post exploitation scripting
Networking, platforms, and homelab

Build small but realistic environments that mimic enterprise setups and keep everything documented and reproducible.

Linux & RHEL Windows client & server Active Directory Raspberry Pi Pi hole & Unbound WireGuard VPN pfSense & firewalls DHCP & DNS SSH & secure remote access NAS / storage basics VirtualBox VMware Network segmentation basics VPN design Wireless networking
Programming, data, and automation

Use scripting and data analysis to speed up recon, analysis, and reporting, and to support machine learning driven research and tooling.

Python Bash scripting PowerShell C / C++ basics Flask & REST APIs Django basics JavaScript HTML & CSS SQL / MySQL MongoDB NumPy Pandas Scikit learn TensorFlow Streamlit Git & GitHub MATLAB & Simulink
Cloud, IoT, and security fundamentals

Connect cloud services, IoT, and core security principles so that lab work stays aligned with real environments and governance requirements.

AWS basics & IAM MQTT ESP32 microcontrollers IoT security TLS / HTTPS Encryption & cryptography Password management Cybersecurity fundamentals Network security Cyber defense Risk and cyber security risk Research & documentation
Tools, platforms, and extras

Extra tools that show up across projects, labs, and side work, especially when documenting findings or presenting results.

Kali Linux tooling Android & Kotlin basics Node.js sockets Arduino & embedded Photoshop Lightroom Technical writing Teaching & mentoring peers
Projects

Turning lab ideas into usable security tools.

These projects come directly from my GitHub and homelab work. They combine blue team thinking, offensive techniques, research, and clear write ups. GitHub links are provided for all public repositories.

Network Security
WireGuard VPN Setup on Raspberry Pi 5

Weekend build where I deployed a WireGuard VPN with Pi hole on a Raspberry Pi 5 to get network wide DNS filtering even when I am off site.

Raspberry Pi Pi hole WireGuard
See Project
Security Awareness
GoPhish Phishing Simulation Lab

End-to-end GoPhish lab: plan, run, and analyze phishing simulations with templates, cloned landing pages, SMTP setup, and full reporting.

GoPhish SMTP Reporting
See Project
Network Defense
PiHole Ultimate DNS Firewall

Transformed a Raspberry Pi into an enterprise-grade DNS firewall that eliminates ads, trackers, malware, and telemetry across all devices.

Pi-hole Unbound Firewall
See Project
SOC Simulation
Cybersecurity Home Lab

Virtualized cybersecurity home lab built on VirtualBox featuring pfSense, Wazuh, MITRE Caldera, Nessus, and Active Directory for red teaming.

Wazuh pfSense Active Directory
See Project
Malware Analysis
Hidden Keylogger

Techniques for gathering system and network information, capturing user activity (clipboard/keys), and encrypting data using AES.

Python AES Scanner
See Project
Cryptography
Secure Chat Application

A secure chat application implemented using Python. Uses RSA encryption for secure message exchange between clients and a server.

Python RSA Sockets
See Project
OS Algorithms
Round Robin Scheduler

Python script that simulates a thread scheduler using round-robin scheduling with priority, providing insights into CPU performance.

Python Algorithms CPU
See Project
Python Automation
Notification Reminder

Simple Python script for sending customizable desktop notifications. Designed to be flexible and easy to use for alert automation.

Python Automation Scripting
See Project
Python GUI
Tic-Tac-Toe

A modern implementation of the classic Tic Tac Toe game built with Python and Pygame, featuring custom graphics.

Python Pygame Game Dev
See Project
Python GUI
Snake Game

Modern take on the classic Snake game, built using Python and Pygame. Features sound effects and a highscore tracking system.

Python Pygame Game Dev
See Project
Cryptography
End-to-End Encryption

Demonstrates E2EE using Python sockets. Implements x25519 key exchange and AES encryption for secure client-server communication.

Python AES x25519
See Project
Automation
Bot

Python based bot automation script. Developed for internal testing and task automation purposes.

Python Automation Bot
See Project
Certifications & Achievements

Learning backed by credentials and impact.

A comprehensive view of my professional certifications, academic honors, competitions, and volunteering leadership that demonstrate continuous learning and community engagement.

Professional Certifications
CompTIA Security+ (SY0-701)
CompTIA

Validates core security skills across network security, identity and access, incident response, risk management, and governance. Served as a foundational step for SOC work and blue team thinking.

Network security Incident response Risk management
Certified in Cybersecurity (CC)
ISC2

Covers security principles, business continuity, access control, operations security, and network security concepts and helps connect technical work with policy and control frameworks.

Security fundamentals Access control Operations security
Red Hat System Administration
Red Hat Academy

Completed RH124, RH134, and RH294. Focused on RHEL, secure remote access, Bash scripting, SELinux, user and permission management, and network services which I apply directly in lab environments.

RHEL Bash scripting Server hardening
Industrial Intrusion Certificate
TryHackMe · Issued Jul 2025

Hands-on training focused on securing ICS and SCADA systems, understanding OT protocols, and defending critical infrastructure against targeted attacks.

ICS/SCADA OT Security Critical Infrastructure
Cybersecurity Job Simulation
Forage (Mastercard) · Issued Jun 2025

Completed a job simulation involving phishing analysis, security awareness training, and data protection strategies, mirroring real-world analyst tasks.

Phishing Analysis GRC Security Awareness
Cybersecurity Analyst Job Simulation
Forage (Tata Group) · Issued Jun 2025

Worked on Identity and Access Management (IAM) strategy, documentation, and integration challenges in a global enterprise environment simulation.

IAM Strategy Consulting
Google Foundations of Cybersecurity
Google

Introduced structured SOC workflows, SIEM usage, Linux basics, SQL, and core security principles which now back my homelab and CTF work.

SOC fundamentals Linux SQL
Python for Cybersecurity and Ethical Hacking courses
InfoSec, Internshala, Coursera, and university

Multiple courses across Python for cybersecurity, ethical hacking, web application security, machine learning, and IoT security that support my scripting and research projects.

Python Ethical hacking Machine learning
Competitions & CTFs
NSA Codebreaker Challenge
National Security Agency

Solved mission-centric reverse engineering and cryptanalysis challenges involving real-world scenarios to track and neutralize simulated threats.

Reverse Engineering Cryptanalysis Mission-Centric
BSidesNYC 2025 — Pros v Joes CTF
John Jay College (CUNY) · Oct 18, 2025

Competed as a Blue Team member in a live SOC simulation. Defended environments against a relentless Red Team by monitoring systems, analyzing logs, patching services, and coordinating defense strategies in a high-pressure scenario.

Blue Team SOC Incident Response
Security BSidesCT CTF
Sacred Heart University · Sep 20, 2025

Finished 5th in the "Army of One" bracket and 10th overall with 3,734 points out of 83 players. Solved challenges across various domains using tools and "living off the land" techniques.

Top 10 CTF Solo
TryHackMe Industrial Intrusion CTF
Jun 2025

Ranked 278th out of 3,000+ active teams with 472.5 points. Focused on ICS enumeration, web API exploration, Node-RED exploitation, and Modbus/PLC tasks.

ICS/OT Node-RED Modbus
CBC Community of Practice CTF
NCCoE · May 2025

Secured 7th place with 1300 points out of 41 active players. Challenges covered Forensics, OSINT, Steganography, Cryptography, and Reverse Engineering.

7th Place Crypto Forensics
CIT CTF 2025
University of New Haven · Apr 2025

Team "CTF Chargers" secured 136th spot out of 950 competing teams. Personally earned 9,720 points tackling Reverse Engineering, Web Exploitation, and Forensics challenges.

Reverse Engineering Web Exp
JerseyCTF V 2025
NJIT · Mar 2025

Secured 54th place out of 400+ teams in a 24-hour Jeopardy-style competition. Leveraged Ghidra, CyberChef, and Python scripting to automate flag hunting and solve binary exploitation tasks.

Top 15% Binary Exp Scripting
Jigsaw Phishing Quiz
Google Jigsaw · 2025

Achieved a perfect score of 10/10 in Google Jigsaw's advanced phishing quiz, demonstrating sharp skills

Volunteering & Leadership
Vice President of Public Relations
Graduate Student Council, UNH · Sep 2024 - Present
  • Creative Marketing: Designing flyers and branding materials for campus events.
  • Social Media: Managing accounts to ensure consistent engagement and presence.
  • Event Documentation: Photographing key GSC and OGISL events.
  • Outreach: Conducting interviews to highlight student and faculty stories.
Campus Connector
University of New Haven · Aug 2024 - Dec 2024
  • Facilitated onboarding for incoming graduate and international students.
  • Led campus tours and informational sessions to improve student retention.
  • Provided guidance on academic resources and cultural integration.
Head of Community Outreach
Indian Student Council · Jan 2024 - Jan 2025
  • Led recruitment efforts using digital tools like QR codes for seamless sign-ups.
  • Collaborated with council members to support diversity initiatives.
  • Managed member feedback and attendance tracking for large-scale events.
Event Photographer
Indian Student Council · Nov 2023
  • Documented the major Diwali event, capturing performances and activities.
  • Assisted with event logistics and setup to ensure smooth execution.
  • Collaborated with the team to create a welcoming festive atmosphere.
Publications
Detecting Cyber Attacks in a Cyber physical Power System: A Machine Learning Based Approach
IEEE · Dec 2022

Proposed and evaluated a machine learning based intrusion detection approach for cyber physical power systems by comparing classifiers on accuracy, precision, recall, and F1 score against attack scenarios.

View Publication
A Machine Learning Approach to Transformer Oil Temperature Monitoring Using Load Analysis
IEEE · Dec 2022

Used machine learning models to predict transformer oil temperature based on load conditions to help utilities detect faults early and maintain reliability.

View Publication
A Practical Byzantine Fault Tolerance Blockchain for Securing Vehicle to Grid Energy Trading
IEEE · Dec 2022

Explored a blockchain approach to secure communication and transactions between electric vehicles and the grid using a practical Byzantine fault tolerant style architecture.

View Publication