Cyber Security Portfolio

Hi, Your Name here – aspiring cyber security engineer.

B.Tech CSE (Cyber Security) student focused on network security, web app security, and solving CTF-style challenges. Enjoys analyzing packets, breaking vulnerable apps, and documenting clear remediation steps.

Location Vadodara · Gujarat, India
Current status B.Tech CSE, Cyber Security specialization
Availability: Open for internships
Y
Terminal snapshot
whoami & key focus areas
secure-shell · /home/you
you@portfolio:~$ whoami # B.Tech CSE student specializing in cyber security you@portfolio:~$ ./focus_areas.sh > network_security = packet analysis, basic incident response > web_app_security = OWASP basics, hands-on labs > ctf_practice = picoCTF, TryHackMe, NiteCTF > tools = Linux, Wireshark, Nmap, Burp Suite you@portfolio:~$ echo "Ready to secure your systems."
Profile

About & skill snapshot

Quick overview of background, interests, and core tools used across security projects and CTF practice.

About

B.Tech CSE (Cyber Security) student with a strong interest in securing networks and web applications. Comfortable working in Linux environments, reading logs, and analyzing suspicious traffic. Enjoys solving capture-the-flag challenges and building small security-focused projects that simulate real-world attack and defense scenarios.

  • Cyber security focused
  • Hands-on learner
  • CTF participant
  • Open to internships

Skills

Security
  • Network security fundamentals
  • Web app security · OWASP basics
  • CTF-style problem solving
  • Basic incident response workflow
Tools
  • Linux · Bash
  • Wireshark · tcpdump
  • Nmap · basic NSE
  • Burp Suite (community)
Programming
  • Python for scripting
  • C / C++ basics
  • HTML · CSS · JS for front-end
  • Git & GitHub
Concepts
  • TCP/IP, DNS, HTTP
  • Authentication & authorization
  • Basic cryptography concepts
  • Secure coding mindset
Work

Security projects & labs

A selection of academic projects, CTF-style exercises, and self-driven labs that demonstrate practical cyber security skills.

Network forensics

Incident-style PCAP analysis

Wireshark · TCP/IP · HTTP · DNS

Analyzed a suspicious traffic capture to identify attacker IP, targeted service, and exfiltrated data. Used protocol filters, stream reconstruction, and basic IOC extraction to simulate an incident investigation.

Wireshark PCAP analysis Incident response
Secure systems

Secure record storage prototype

Python · basic CV · blockchain concept

Designed a prototype that processes sensitive images, extracts key features, and stores related records in a tamper-resistant ledger. Focused on integrity, controlled access, and auditability of stored data.

Python Data integrity Audit logging
CTF practice

Web exploitation & crypto writeups

picoCTF · TryHackMe · NiteCTF

Regularly solve CTF challenges across web, crypto, and forensics categories and write structured walkthroughs highlighting methodology, commands, and mitigation ideas for each solved task.

CTF methodology Web exploitation Crypto & forensics
Automation

Security helper scripts

Python · Bash

Small scripts that automate routine security tasks such as running basic recon commands, parsing logs for suspicious patterns, and organizing CTF notes and artifacts.

Python scripting Log parsing Automation
Path

Education & experience

Academic background and relevant activities that strengthen cyber security understanding.

Education
B.Tech in Computer Science & Engineering (Cyber Security)
Your College Name · Expected Graduation: 20XX · Core subjects: Network Security, Cryptography, Operating Systems, Computer Networks, Web Technologies
Activities
CTF & lab participation
Participated in online CTFs and security labs (picoCTF, TryHackMe, NiteCTF, etc.), focusing on web exploitation, forensics, and basic reverse engineering.
Learning
Self-paced security courses
Completed online modules in introduction to cyber security, network basics, Linux fundamentals, and web application security from various platforms.
Connect

Contact & links

Reach out regarding internships, project collaborations, or cyber security communities.

Contact info

Prefer clear documentation, reproducible steps, and collaborative problem solving. Open to cyber security internships, junior SOC roles, and security-focused development work.

Quick message (UI only)

This form is front-end only for now. You can replace it with a real backend or form service later.