Security Engagements Portfolio

Real-world offensive security operations, red team engagements, cloud penetration testing, and security research initiatives

Machine Learning-Based Network Intrusion Detection System
Security Research

Machine Learning-Based Network Intrusion Detection System

Jun 2024

Built a network IDS using supervised machine learning with SVM and Random Forest classifiers on the NSL-KDD dataset, achieving 92% accuracy and 80% F1-score with 6% false positive rate.

Key Achievements:

  • Achieved 92% accuracy and 80% F1-score with 6% false positive rate after feature engineering and model optimization
  • Used StandardScaler for normalization, SMOTE for class balancing, and 5-fold cross-validation for robust model evaluation
  • Simulated attack traffic including DoS floods, brute-force attempts on SSH/RDP, port scans, and credential misuse
  • \n
PythonScikit-learnAWS EC2SVM
View Full Case Study
Cryptographic E-Voting Platform with Zero-Knowledge Proofs
Security Research

Cryptographic E-Voting Platform with Zero-Knowledge Proofs

Jan 2025

Built a secure e-voting system using PGP encryption (2048-bit RSA), digital signatures (RSA-PSS), and Zero-Knowledge Proof concepts to ensure ballot confidentiality and voter authentication.

Key Achievements:

  • Implemented PGP encryption (2048-bit RSA) for ballot confidentiality and RSA-PSS digital signatures for voter authentication
  • Integrated Zero-Knowledge Proof concepts allowing voters to verify their vote was counted without revealing their choice
  • Built cryptographic commitments to prevent double voting and hash chains for tamper detection
  • \n
PythonFlaskPGP EncryptionRSA (2048-bit)
View Full Case Study
AWS Security Lab - Cloud Attack & Detection
Cloud Security

AWS Security Lab - Cloud Attack & Detection

Feb 2025

Built comprehensive AWS security lab environment simulating cloud attacks with corresponding detection rules using GuardDuty, CloudTrail, and Elastic Stack for centralized logging.

Key Achievements:

  • Configured complete AWS security stack: EC2, S3, IAM, CloudTrail, GuardDuty for attack simulation and detection
  • Implemented Elastic Stack for centralized logging and security event correlation
  • Developed attack scenarios: IAM privilege escalation, S3 bucket misconfigurations, EC2 instance compromise, suspicious Lambda invocations
  • \n
AWS EC2AWS S3AWS IAMAWS CloudTrail
View Full Case Study
CTF Competitions & Continuous Security Practice
CTF & Training

CTF Competitions & Continuous Security Practice

Mar 2025

Active participation in CTF competitions including BSidesPGH and THRISS 2025, solving 12+ challenges across web exploitation, cryptography, reverse engineering, and forensics.

Key Achievements:

  • Participated in BSidesPGH 2025 and THRISS 2025 CTF competitions
  • Solved approximately 12 challenges across multiple categories
  • Web Exploitation: SQL Injection (SQLi), Cross-Site Scripting (XSS), CSRF, Server-Side Request Forgery (SSRF)
  • \n
Burp SuitePythonGhidraradare2
View Full Case Study