Loading Experience...

I build secure systems.

Protecting digital futures.

Innovative Collaborator

Scroll to explore
Professional Journey

Work Experience

Dec 2025 - Present

REN-ISAC, Indiana UniversitySoftware Engineer

REN-ISAC, Indiana University
  • Developing robust security tools and information sharing platforms for the research and education community.
August 2025 - Present

Center for Applied Cybersecurity Research (CACR), Indiana UniversityCybersecurity Research Fellow

Center for Applied Cybersecurity Research (CACR), Indiana University
  • Built a comprehensive AI security framework to accelerate SOC tool evaluation and risk assessment.
  • Conducted adversarial ML research to identify failure modes and guide evidence-backed AI adoption.
  • Co-delivered workshops on AI-assisted anomaly detection to improve community best practices.
July 2023 - April 2024

Ernst & Young (EY)Cybersecurity Analyst, Technology Consulting

Ernst & Young (EY)
  • Strengthened enterprise security by remediating critical misconfigurations and optimizing defensive controls across network and endpoint layers.
  • Reduced pre-deployment risk through Trivy CI/CD integration and accelerated vulnerability management workflows via custom Python automation.
Academic Background

Education

August 2024 - May 2026

Indiana University BloomingtonMaster of Science, Computer Science

Indiana University BloomingtonGPA: 3.95/4

Relevant Coursework: Applied Algorithms, Applied Database Concepts, Software Engineering, Cloud Computing, Security for Networked Systems.

August 2019 - June 2023

Dwarkadas. J. Sanghvi College of EngineeringBachelor of Technology in Electronics and Telecommunication

Dwarkadas. J. Sanghvi College of EngineeringGPA: 3.84/4

Relevant Coursework: Computer Networks, Internet Engineering and Network Security, Big Data Analytics, DBMS, Data Encryption, Object Oriented Programming, Data Structures and Algorithms

Selected Work

Featured Projects

PromptShield
AI Security

PromptShield

  • Built a Context-Aware Prompt Injection Defense Tool using Zero Trust, Defense in Depth, and STRIDE methodologies.
  • Implemented multi-layer defense with regex static checks, DeBERTa semantic analysis, and a sanitization layer.
  • Integrated Azure-based logging with KQL monitoring and MITRE ATLAS framework mappings for advanced analytics.
LLMZero TrustDefense-in-DepthSTRIDEDeBERTaAzure KQLMITRE ATLAS
AI Open-Source Dependency Guardian
Software Supply Chain Security

AI Open-Source Dependency Guardian

  • Developed a vulnerability scanner for requirements.txt/package.json using NVD, OSV, and CVSS-based risk scoring.
  • Integrated Google Gemini API to generate business-aligned risk reports with impact mapping and rate limiting.
  • Designed a modular Planner-Executor-Memory architecture with auto-patching and Streamlit UI.
Agentic AIPythonGemini APINVD/OSV
BackOps.AI
1st Place
AI Automation

BackOps.AI

  • Led development of an AI assistant to automate backend DB operations, winning 1st place at Luddy Hackathon 2024.
  • Delivered 2× throughput improvement by integrating NLP models, real-time analytics, and audit logging.
  • Reduced dev time by 15% using FastAPI, ChatGPT-4, and SQLite to streamline workflows.
FastAPIChatGPT-4SQLiteServiceNow
CodeNexus
Cloud Platform

CodeNexus

  • Designed a secure, scalable AWS backend (EC2, S3, SQS) supporting 50+ concurrent jobs.
  • Implemented isolated Docker execution for 5 languages to prevent cross-job interference.
  • Integrated static analysis tools (Bandit, Checkstyle) achieving 90% vulnerability detection precision.
AWSDockerFastAPIReactBandit
Li-Fi Accident Prevention
1st Place
IoT & Embedded Systems

Li-Fi Accident Prevention

  • Designed a system using Li-Fi technology for 200Gbps+ V2V communication and accident reporting.
  • Integrated Cloud Firestore and TensorFlow for real-time sensor data analysis and computer vision.
  • Secured 1st place at DJ SPARK 2022 for demonstrating real-world feasibility.
Li-FiTensorFlowReactJSFlask
// Field Operations

Mission Highlights

NSF Cybersecurity Summit 2025
Speaker
2025Boulder, CO

NSF Cybersecurity Summit 2025

Co-delivered a 4-hour workshop for 200+ attendees, including PIs on AI-assisted anomaly detection and security log analysis workflows.

Conference
Bsides Bloomington 2025
Volunteer
2025Bloomington, IN

Bsides Bloomington 2025

Attended workshops on advanced penetration testing and hardware hacking.

Conference
RALLY 2025
Attendee
2025Indianapolis, IN

RALLY 2025

Attended workshops on advanced penetration testing and hardware hacking.

Conference
Recognitions

Professional Certifications

Validated expertise in Cybersecurity, AI, and Cloud Computing through rigorous industry-standard certifications.