$ cat about.txt
> About Me
A skilled security researcher with more than 7 years of experience protecting organizations from cyber and digital threats and implementing advanced security measures.
> Professional Experience
Security Researcher
[2024-Present]
@ RBC
- $ Researched phishing kits and financial malware, sharing insights across teams to boost threat intelligence.
- $ Enhanced detection accuracy by 80% through improved threat hunting scenarios.
- $ Developed and implemented patented cybersecurity solutions to address complex challenges.
- $ Automated analysis of phishing sites, reducing response time for threat detection.
Digital Threat Hunter
[2021-2024]
@ RBC
- $ Built and deployed automation tools to streamline manual security processes.
- $ Utilized WTD RSA AA and Threat Matrix to analyze web traffic and identify threats.
- $ Shared research on phishing kits and malware with cross-functional teams.
Cyber Security Analyst
[2019-2021]
@ RBC
- $ Implemented new threat hunting scenarios to enhance team capabilities.
- $ Conducted security investigations using CrowdStrike, Python, and PowerShell scripts.
- $ Built a Web Apps engine leveraging the Threat Grid API for enhanced detection.
> Education
Master's Diploma in Cyber Security
@ Lambton College
[2017-2018]
B.E. in Computer Science
@ Chandigarh University
[2012-2016]
> Certifications
- $ CISSP
- $ Certified API Security Analyst
- $ Pursuing ASCP
> Patents
SYSTEM AND METHOD FOR SIGNAL PROCESSING FOR CYBER SECURITY
Patent No: 20240338439
Issued: 4/4/2024
System and method for signal processing for cyber fraud detection are disclosed. The method may include: receiving a trigger signal for fraud detection, the trigger signal comprising an event indicator and entity data associated with an entity profile stored in a database; determining, based on the trigger signal, a risk signal processing model comprising a plurality of risk components, each risk component associated with a respective weighing factor; computing, based on the risk signal processing model, a respective risk signal for each of the plurality of risk components; processing the respective risk signal for each of the plurality of risk components in real time or near real time to generate an aggregated risk signal; and generating, based on the aggregated risk signal, a fraud or cyber security alert signal.
View Patent Pro-active detection of misappropriation of website source code
Patent No: US20240179159A1
Issued: 10/30/2023
A method for concealing threat detection and notification code in a website code base comprises maintaining at least one beacon within the website code base. Each beacon is disguised as code for a resource request, and is adapted to transmit at least one signal identifying misappropriation of the website code base. In some embodiments, a first beacon transmits a signal identifying misappropriation of the website code base, and a second beacon transmits a signal identifying tampering with the first beacon
View Patent > Technical Skills
Security Tools
Burp Suite Wireshark Nessus SQL Map OpenVAS CrowdStrike
Programming & Scripting
Python PowerShell API Development Web Services SIEM Systems