What I Build
Security-first tools and workflows: detection logic, response automation, and developer security guardrails that reduce risk without slowing teams.
OFFENSIVE SECURITY | SOFTWARE | LEADERSHIP
Incoming Security Engineer Intern at Amazon and Computer Science student focused on offensive security, threat discovery, and resilient system design.
|
$ boot --profile rohit
Security-first tools and workflows: detection logic, response automation, and developer security guardrails that reduce risk without slowing teams.
I am offensive-security focused, using Nmap, Burp Suite, Nessus, and adversarial validation to find weaknesses, then hardening detections in Splunk, Snort, and SentinelOne.
0
Security alerts investigated
0
Misconfiguration reduction
0
TryHackMe and NCL rankings
0
President's List streak
A mission-style timeline showing how each phase built toward offensive and engineering depth.
Phase 01
Built core programming discipline and systems thinking through tutoring and classroom projects.
Phase 02
Studied AI attack paths and defensive controls, then translated findings into practical recommendations.
Phase 03
Investigated production-scale alerts and improved quality of triage and response playbooks.
Phase 04
Led engineering communities and security workshops while preparing for Amazon security engineering.
Recent 6-month activity footprint across projects, learning, CTF prep, and writing.
9/10 Detection and SIEM workflows
8/10 Offensive web testing
9/10 Recon and network mapping
8/10 Security automation and tooling
8/10 Packet-level investigations
7/10 IDS signatures and tuning
Please wait while the feed initializes.
Hands-on offensive security labs, CTF practice, and continuous skill growth.
Open TryHackMe ProfileThree mini labs for visitors: recon logic, web payload safety, and incident triage.
Recon
0Web
0Triage
0Total
0Score: 0
Problem: Security data was hard to inspect quickly during triage.
Approach: Built an IDS dashboard with live protocol-level telemetry and suspicious activity views.
Impact: Faster anomaly visibility and clearer analyst workflows.
Tailwind CSS • JavaScript • Telemetry View on GitHubProblem: Teams needed realistic IR practice with repeatable workflow.
Approach: Ran IOC correlation and packet/log analysis with Wireshark, Snort, Splunk, and MISP.
Impact: Improved response readiness and gap identification in detection logic.
DFIR • SIEM • Threat Intel View on GitHubProblem: Users lacked safe password-breach checks.
Approach: Implemented k-anonymity hash-prefix lookup against Have I Been Pwned API.
Impact: Detects compromised credentials without exposing plaintext passwords.
Python • API Security • Automation View on GitHubProblem: AI-enabled threats evolve faster than traditional playbooks.
Approach: Studied attack patterns and defense controls, then published practical recommendations.
Impact: Produced actionable guidance for stronger monitoring and resilience strategy.
Research • Threat Modeling • Strategy View on GitHubDeep dives with architecture, attack surface, and results for each project.
Detection workflow design, telemetry schema, and triage impact analysis.
Open case studyIOC correlation process, log timeline reconstruction, and response maturity outcomes.
Open case studyk-Anonymity design decisions, privacy-safe API strategy, and validation results.
Open case studyThreat model, attacker simulation patterns, and defensive control mapping.
Open case studySelected updates from leadership, internship milestones, and security work. Edit the cards below directly when you want to swap in newer posts.
Shared the milestone of joining Amazon Security Engineering and the growth path behind it.
Career UpdatePortfolio of hands-on security work, community leadership, and public progress updates.
LinkedInA quick-reference breakdown of the OWASP Top 10 — attack patterns I actively test for and build detections around.
Mini Tab
Pick an item from the list to view a concise explanation.
Writeups covering security concepts, lab work, and practical lessons from hands-on testing.
MediumOperational notes on improving signal quality, analyst workflow, and incident response reasoning.
Blue TeamShort-form testing notes and observations from labs, tooling, and controlled offensive practice.
Offensive Security"Rohit consistently combines hands-on security work with leadership. His ability to translate complex findings into clear actions stands out."
— Sarah M., Senior Security Engineer at IVX Healthcare"He brings strong ownership to secure development and has a practical mindset for improving detections and reducing noise."
— Daniel L., Software Security Mentor at Tennessee State University