$ cat about.txt

> About Me

A skilled security researcher with more than 7 years of experience protecting organizations from cyber and digital threats and implementing advanced security measures.

> Professional Experience

Security Researcher

[2024-Present]
@ RBC
  • $ Researched phishing kits and financial malware, sharing insights across teams to boost threat intelligence.
  • $ Enhanced detection accuracy by 80% through improved threat hunting scenarios.
  • $ Developed and implemented patented cybersecurity solutions to address complex challenges.
  • $ Automated analysis of phishing sites, reducing response time for threat detection.

Digital Threat Hunter

[2021-2024]
@ RBC
  • $ Built and deployed automation tools to streamline manual security processes.
  • $ Utilized WTD RSA AA and Threat Matrix to analyze web traffic and identify threats.
  • $ Shared research on phishing kits and malware with cross-functional teams.

Cyber Security Analyst

[2019-2021]
@ RBC
  • $ Implemented new threat hunting scenarios to enhance team capabilities.
  • $ Conducted security investigations using CrowdStrike, Python, and PowerShell scripts.
  • $ Built a Web Apps engine leveraging the Threat Grid API for enhanced detection.

> Education

Master's Diploma in Cyber Security

@ Lambton College
[2017-2018]

B.E. in Computer Science

@ Chandigarh University
[2012-2016]

> Certifications

  • $ CISSP
  • $ Certified API Security Analyst
  • $ Pursuing ASCP

> Patents

SYSTEM AND METHOD FOR SIGNAL PROCESSING FOR CYBER SECURITY

Patent No: 20240338439
Issued: 4/4/2024
System and method for signal processing for cyber fraud detection are disclosed. The method may include: receiving a trigger signal for fraud detection, the trigger signal comprising an event indicator and entity data associated with an entity profile stored in a database; determining, based on the trigger signal, a risk signal processing model comprising a plurality of risk components, each risk component associated with a respective weighing factor; computing, based on the risk signal processing model, a respective risk signal for each of the plurality of risk components; processing the respective risk signal for each of the plurality of risk components in real time or near real time to generate an aggregated risk signal; and generating, based on the aggregated risk signal, a fraud or cyber security alert signal.
View Patent

Pro-active detection of misappropriation of website source code

Patent No: US20240179159A1
Issued: 10/30/2023
A method for concealing threat detection and notification code in a website code base comprises maintaining at least one beacon within the website code base. Each beacon is disguised as code for a resource request, and is adapted to transmit at least one signal identifying misappropriation of the website code base. In some embodiments, a first beacon transmits a signal identifying misappropriation of the website code base, and a second beacon transmits a signal identifying tampering with the first beacon
View Patent

> Technical Skills

Security Tools

Burp Suite Wireshark Nessus SQL Map OpenVAS CrowdStrike

Programming & Scripting

Python PowerShell API Development Web Services SIEM Systems