Sentry Supply Chain Security
Runtime dependency threat detection
A three-part platform for watching developer machines, discovering vulnerable packages, and enforcing CVE-aware policy through a cloud brain, local agent, and runtime hooks.
TryHackMe Legend 0xD / Top 2 percent globally
I break systems to understand them. Then I harden them so others cannot.
DevSecOps engineer and M.Sc. Cyber Security student at NFSU, specializing in penetration testing, API security, cloud-native defense, CTFs, and open-source kernel work.
Lixta Networks, Bhiwandi, Mumbai
Production security work across cloud logs, Kubernetes deployments, CI/CD controls, Cisco XDR integrations, observability, and automated server provisioning.
Runtime dependency threat detection
A three-part platform for watching developer machines, discovering vulnerable packages, and enforcing CVE-aware policy through a cloud brain, local agent, and runtime hooks.
Tor flow reconstruction and correlation
A Tor traffic analysis platform that extracts flows from PCAP or live captures, correlates timing with relay metadata, and ranks candidate circuit behavior for forensic review.
Aadhaar anomaly detection
A governance analytics system that detects irregularities in anonymised Aadhaar datasets using rolling baselines, statistical outlier detection, and stability scoring.
Android kernel maintenance
Founded and maintain Nova-Kernels for Xiaomi MT6785 devices targeting Android 15, with work across root integration, scheduler tuning, memory fixes, I/O optimization, and battery behavior.
Threat detection using AI and quantum concepts
A lightweight, extensible security and monitoring toolkit combining AI and quantum-computing ideas for early ransomware and malware detection.
Real-time risk scoring
The Armour that Renders Assurance, an Android app that uses predictive analytics and live camera feed analysis to assess and alert on women's safety risks in real time.
The portfolio should feel like a scoreboard because the work is validated in public: TryHackMe, national hackathons, CTFs, open-source mentoring, and kernel maintenance.
Winner with TARA, a predictive safety analytics Android system.
Top 65 out of 6600 participants with Rakshak for quantum ML threat detection.
Built applied security and analytics work in a competitive NFSU setting.
CTF competitor across pwn, crypto, reverse engineering, web, and forensics.
Top 10 placement in inter-campus capture-the-flag competition.
4th place finish in RedTeam Chennai CTF.
Founded Nova-Kernels and maintain custom Android Linux kernels for Xiaomi MT6785, including KernelSU integration, CPU scheduler tuning, memory fixes, I/O optimizations, and battery improvements.
Ranked 6th in the top 50 mentors nationally and reviewed or merged 25+ contributor pull requests across multiple repositories.
Accepted abstract on ConvLSTM intrusion detection with blockchain-backed data integrity for FANETs, reporting 82.6% detection accuracy and 99.5% collision avoidance in ROS-based simulations.
Web, API, network, IoT, reporting, and exploit-driven validation.
Focused on application security, cloud security, network defense, digital forensics, risk management, DevSecOps, and secure deployment architecture.
9.3 CGPA, SGPA 9.8, rank #1. Technical Head for inter-collegiate Tech-Fest and builder of a secure Python LAN event management platform.
Hands-on labs across Kali Linux, WebSploit, scoping, vulnerability assessment, reporting, API risk, threats, compliance, and OWASP API Top 10.
Mentored contributors from Nov 2024 to Feb 2025 and Sep 2024 to Jan 2025, with a strong open-source review and collaboration record.