| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidate Indianapolis, Indiana 26202, USA
Candidate's Name EMAIL AVAILABLE | (PHONE NUMBER AVAILABLE
Digital Portfolio| Google Scholar | LinkedIn
PROFESSIONAL EXPERIENNCE
Gurugram Police Cyber Security Summer Internship (View in Detail: Digital Portfolio) Jun Street Address July 24
Indian Police Cyber Crime - Gurugram, India
o During the GPCSS12024 internship, I gained practical cybersecurity experience, highlighted by participating
in the Zupee Capture The Flag (zCTF) challenge.
o Competing with 256 participants, we tackled 17 complex cybersecurity tasks in a 4-hour session, that focused
on threat detection, incident response, and ethical hacking.
JP Morgan & Chase Co. Cybersecurity Virtual Experience Program (View in Detail: Digital Portfolio) Aug 23
Virtual Program
o The Virtual Experience Program offered practical experience in threat identification, secure code review, risk
assessment, and incident management.
o Utilized technologies such as Splunk for Security Information and Event Management (SIEM) for network
monitoring systems, and secure coding practices to address security challenges.
Cyber Security Analyst (View in Detail: Digital Portfolio) Oct 22 Nov 22
Intrainz - Noida, India
o My role at Intrainz focused on identifying vulnerabilities through vulnerability assessment, and using SIEM
tools to identify and tackle security incidents.
o Furthermore, enhanced the network security through tasks such as port filtering, and setting up firewall rules
on the cloud.
o Also gained an understanding of NIST Cybersecurity Framework (NIST CSF) and OWASP Top 10 Principles
that establish several robust security protocols in a company.
Google Cloud Ready Skills Boost Program (View in Detail: Digital Portfolio) Apr 22 Jun 22
Google Cloud Community India
o Throughout this three-month program, I gained hands-on expertise with a variety of Google Cloud Platform
tools including Firewall Security, Kubernetes Engine, Docker, Firestore, Compute Engine, BigQuery, etc. I
worked on configuring these technologies to ensure data protection and operational resilience in the cloud .
KEY PROJECTS (Screenshots and working of Projects on: Digital Portfolio)
CryptStego Web Application offering Information Security using Cryptography and Steganography for encryption
and decryption (Link to repository on GitHub)
Utilized TCP Dump to capture packets and then use Wireshark to analyze HTTP/S and RDP traffic
Vulnerability Assessment through Quantitative Analysis (OSINT Framework)
Enabling and Configuring Microsoft Firewall Rules
Access Control and Management of text files using Linux commands
Evaluation of Various Lightweight Cryptographic (LWC) Ciphers for Smart Cities (Link to repository on GitHub)
Resolve Ransomware Attack on a Linux Virtual Machine through decryption techniques of a of
Used Event Tracing for Windows (ETW) to identify unusual parent-child relationships and malicious. NET assembly
loading
Utilized Get-WinEvent cmdlet to analyze Windows Event Logs
SKILLS
Splunk SIEM Dashboard Linux System Administration and Commands
Network traffic analysis using TCPDump and Wireshark NIST CSF and OWASP Principles
Microsoft Windows Defender and Windows Firewall Windows Event log analysis using Sysmon and
Vulnerability Management and Threat Analysis Tracing for Windows (ETW)
Windows Active Directory Penetration Testing on Kali Linux
EDUCATION
- Master of Science Cybersecurity and Trusted Systems, Aug 24 Jun 26
Purdue University, Indiana, USA
Cumulative GPA: N/A (First Semester)
- Bachelor of Technology Computer Science and Engineering Sept 20 Jun 24
Sharda University, Noida, India
Cumulative GPA: 9.0 (10.0 point-scale)
Activities: Head Coordinator of Cyber Pirates Club
MAJOR PUBLICATIONS (View in Detail: Google Scholar)
All in the field of Cybersecurity
Candidate's Name , Bharat Bhushan, Recent Lightweight Cryptography (LWC) based Security Advances for
Resource-Constrained IoT Networks (Published in Q2 Journal of Wireless Network, Springer, Link to the
paper)
Candidate's Name , Bharat Bhushan, Exploring The Viability And Effectiveness of Lightweight Cryptographic
Techniques in Enhancing The IoT Data Security of Smart Cities , 2nd International Conference on Computational
Intelligence and Sustainable Engineering Solutions (CISES 2023), Greater Noida, India, April 2023 (Proceedings
published by IEEE, Link to the paper)
Candidate's Name , Bharat Bhushan, Alaa Ali Hameed, Akhtar Jamil, Aayush Juyal, Implementation of
Homomorphic Encryption Schemes in Fog Computing , The 2nd International Conference on Computing, IoT and
Data Analytics (ICCIDA 2023), La Mancha, Spain, July 2023 (Proceedings published by Springer, Link to the
paper)
Candidate's Name , Pashupati Baniya, Parma Nand, Alaa Ali Hameed, Bharat Bhushan, and Akhtar Jamil,
CryptStego: A Powerful Blend of Cryptography and Steganography for Securing Communications , International
Conference on Emerging Trends and Applications in Artificial Intelligence , IoT and Data Analytics (ICETAI 2023),
Istanbul, Turkey, September 2023 (Proceedings published by Springer, Link to the paper)
Candidate's Name , Abhik K. De, S. Choudhary, B. Bhushan, S. Bhatia, Leveraging Blockchain Technology in
Industry 4.0 and Industrial Internet of Things (IIoT) Scenarios , Chapter 12 under Book of Low Power Architectures
for IoT Applications (Chapter published by Springer, Link to the chapter)
Candidate's Name , Abhik K. De, S. Choudhary, M. Asim, "A Decentralized Blockchain-Based Architecture for
Healthcare Industry", International Conference on Artificial Intelligence for Innovations in Healthcare Industries
(ICAIIHI-2023), Chhattisgarh, India, December 2023 (Proceedings published by IEEE, Link to the paper)
|