Work Experience

I’m a Computer Networks and Security student building hands-on experience through academic projects, labs, and continuous learning. Here’s my journey so far.

40+
Technologies Used
35+
Projects Completed
3+
Recommendations Received
20+
Courses Completed

Student Researcher

Sep 2025 - Present

Key Responsibilities:

  • Configured virtual network environments to test security vulnerabilities
  • Analyzed network traffic using Wireshark to identify potential threats
  • Documented security findings and presented to lab group
Wireshark Kali Linux VirtualBox Nmap

Collaborative Developer

Oct 2025 - Present

Key Responsibilities:

  • Implemented RSA and AES-256 encryption for secure message transmission
  • Designed database schema for user credentials and encrypted message storage
  • Developed real-time communication using Python socket programming
  • Conducted security testing to identify and fix vulnerabilities
Python Cryptography SQL Socket Programming bcrypt

Competitor & Security Enthusiast

Jan 2025 - Present

Key Responsibilities:

  • Solved challenges in web exploitation, cryptography, and network forensics
  • Collaborated with team members on complex problems during 24-hour competitions
  • Created practice challenges for new team members
  • Placed in top 20% in regional university CTF
Burp Suite Wireshark John the Ripper Metasploit

Self-Directed Learner

Jun 2024 - Present

Key Responsibilities:

  • Set up virtual machines with vulnerable applications (DVWA, Metasploitable)
  • Configured pfSense firewall and monitored network traffic
  • Practiced penetration testing techniques in isolated environment
  • Documented learning progress and created study notes for peers
VirtualBox Kali Linux DVWA SNMP - Nagios Wireshark

Student

Sep 2025 - Present

Key Responsibilities:

  • CCNA: Introduction to Networks - Routing, switching, and network protocols
  • Network Defense - Firewalls, IDS/IPS implementation
  • Cyber Threat Management - Risk assessment and incident response
  • Networking Devices and Initial Configuration
Cisco IOS Routing Protocols VLANs ACLs VPNs