$ cat about.txt

> About Me

A skilled security researcher with more than 7 years of experience protecting organizations from cyber and digital threats and implementing advanced security measures.

> Professional Experience

Security Researcher

[2024-Present]
@ RBC
  • $ Researched phishing kits and financial malware, sharing insights across teams to boost threat intelligence.
  • $ Enhanced detection accuracy by 80% through improved threat hunting scenarios.
  • $ Developed and implemented patented cybersecurity solutions to address complex challenges.
  • $ Automated analysis of phishing sites, reducing response time for threat detection.

Digital Threat Hunter

[2021-2024]
@ RBC
  • $ Built and deployed automation tools to streamline manual security processes.
  • $ Utilized WTD RSA AA and Threat Matrix to analyze web traffic and identify threats.
  • $ Shared research on phishing kits and malware with cross-functional teams.

Cyber Security Analyst

[2019-2021]
@ RBC
  • $ Implemented new threat hunting scenarios to enhance team capabilities.
  • $ Conducted security investigations using CrowdStrike, Python, and PowerShell scripts.
  • $ Built a Web Apps engine leveraging the Threat Grid API for enhanced detection.

> Education

Master's Diploma in Cyber Security

@ Lambton College
[2017-2018]

B.E. in Computer Science

@ Chandigarh University
[2012-2016]

> Certifications

  • $ CISSP
  • $ Certified API Security Analyst
  • $ Pursuing ASCP

> Patents

AUTOMATED TARGETED REMEDIATION OF PHISHING WEBSITES

Patent No: 20260075091
Issued: 3/12/2026
A computer-implemented method for remediation targeting a threat actor computer system collects ongoing threat actor signals from a plurality of input channels, processes the threat actor signals to instantiate threat actor detections from the threat actor signals and stores the threat actor detections in a data repository as part of threat actor activity data maintained within the data repository. The threat actor detections are analyzed to identify threat actor computer system(s). Abiotic digital scouting agents perform covert digital reconnaissance of the threat actor computer system(s) according to a scouting protocol to identify respective characteristics of the threat actor computer system(s). The characteristics identified by the abiotic digital scouting agents are used to determine a seeding protocol, and abiotic digital scouting agents are used to seed a plurality of synthetic user identities into the threat actor computer system(s).
View Patent

SYSTEM AND METHOD FOR SIGNAL PROCESSING FOR CYBER SECURITY

Patent No: 20240338439
Issued: 4/4/2024
System and method for signal processing for cyber fraud detection are disclosed. The method may include: receiving a trigger signal for fraud detection, the trigger signal comprising an event indicator and entity data associated with an entity profile stored in a database; determining, based on the trigger signal, a risk signal processing model comprising a plurality of risk components, each risk component associated with a respective weighing factor; computing, based on the risk signal processing model, a respective risk signal for each of the plurality of risk components; processing the respective risk signal for each of the plurality of risk components in real time or near real time to generate an aggregated risk signal; and generating, based on the aggregated risk signal, a fraud or cyber security alert signal.
View Patent

Pro-active detection of misappropriation of website source code

Patent No: US20240179159A1
Issued: 10/30/2023
A method for concealing threat detection and notification code in a website code base comprises maintaining at least one beacon within the website code base. Each beacon is disguised as code for a resource request, and is adapted to transmit at least one signal identifying misappropriation of the website code base. In some embodiments, a first beacon transmits a signal identifying misappropriation of the website code base, and a second beacon transmits a signal identifying tampering with the first beacon
View Patent

> Technical Skills

Security Tools

Burp Suite Wireshark Nessus SQL Map OpenVAS CrowdStrike

Programming & Scripting

Python PowerShell API Development Web Services SIEM Systems