I'm a 2nd year Cybersecurity student from India focused on becoming a Cloud Security Engineer.
My work focuses on understanding how systems communicate, how attacks happen, and how cloud infrastructure can be secured.
I enjoy building hands‑on security projects, analyzing network traffic, and translating traditional security problems into cloud security solutions.
My long‑term goal is to design and secure resilient cloud infrastructure and applications.
🔹 Cloud Security Fundamentals
🔹 Network Visibility & Traffic Analysis
🔹 Web Application Security & Vulnerability Assessment
🔹 Security Automation with Python & Bash
🔹 Threat Modeling & Secure Architecture
🔹 Multi‑Cloud Security Awareness (Azure + AWS)
Tools: Wireshark • TCP/IP • DNS • HTTP • TLS
Performed packet‑level analysis of network traffic using Wireshark to understand how protocols communicate and how network visibility translates into cloud monitoring.
Key Work:
- DNS request and response inspection
- TCP three‑way handshake analysis
- HTTP request and response analysis
- TLS encrypted traffic observation
Cloud Security Mapping:
- AWS VPC Flow Logs
- Azure Network Security Groups (NSG)
- Cloud network monitoring concepts
🔗 Repository
https://github.com/Sakshats993/Cloud-Network-Traffic-Analysis
Tech: Python • Nmap • Security Automation
Developed a Python‑based automation tool to perform network reconnaissance and generate structured reports.
Features:
- Automated Nmap scanning
- Attack surface discovery
- Structured report generation (HTML, JSON, TXT)
- Security assessment workflow automation
Security Concepts:
- Network reconnaissance
- Attack surface mapping
- Automated security reporting
🔗 Repository
https://github.com/Sakshats993/Attack-Surface-Discovery
Focus: Web vulnerability analysis & remediation
Performed a structured security assessment of a web application and documented vulnerabilities with remediation strategies.
Concepts Practiced:
- OWASP Top 10 vulnerability analysis
- Web application attack surface identification
- Threat modeling concepts
- Security remediation planning
Cloud Security Mapping:
- Web Application Firewall (WAF)
- Secure cloud deployment considerations
🔗 Repository
https://github.com/Sakshats993/Pre-Cloud-Web-Application-Security-Assessment
Tech: Python • Cryptography
Developed an educational cryptography toolkit implementing modern encryption systems.
Implemented:
- AES‑256‑GCM authenticated encryption
- RSA‑OAEP asymmetric encryption
- Hybrid encryption model
Security Concepts:
- Key management
- Authenticated encryption
- Secure cryptographic design
🔗 Repository
https://github.com/Sakshats993/Text-Encryption-Tool
Tech: C++
Developed an educational keylogging tool to understand system monitoring techniques and analyze potential security implications.
Concepts Learned:
- System input monitoring
- Malware behavior analysis
- Endpoint detection considerations
🔗 Repository
https://github.com/Sakshats993/Advanced-Keylogger-Project
- Identity & Access Management (IAM)
- Shared Responsibility Model
- Cloud Misconfiguration Risks
- Secure Cloud Architecture Concepts
- Azure Cloud Fundamentals
- AWS Cloud Fundamentals
- Web vulnerability scanning
- OWASP Top 10 concepts
- Secure application architecture
- Security assessment reporting
- Network traffic analysis
- Packet inspection using Wireshark
- Network discovery using Nmap
- Understanding attack surfaces
- TCP/IP and protocol behavior
- Security scripting with Python
- Bash automation workflows
- Automating reconnaissance & analysis tasks
- Networking fundamentals with security focus
- Web security and vulnerability assessment
- Azure cloud fundamentals and architecture
- Threat modeling and secure system design
- Linux system fundamentals for security engineers
- Cloud security learning projects
- DevSecOps practice labs
- Web application security research
- Security automation tools
- Open‑source cybersecurity tools
- Cloud threat detection
- Detection engineering concepts
- Cloud misconfiguration analysis
- Secure infrastructure design
- Security monitoring and logging
- Cybersecurity fundamentals
- Network traffic analysis
- Web vulnerability scanning
- Structuring cybersecurity projects
- Starting a cloud security career
I enjoy breaking down complex cybersecurity concepts into clear, structured explanations and building projects that demonstrate real understanding instead of just tool usage.
📧 Email: sakshats993@gmail.com
