Penetration Testing · Vulnerability Assessment · Secure Software Development
Practical, tool-driven cybersecurity practitioner focused on red-team techniques, defensive monitoring, and secure development practices.
Aspiring cybersecurity engineer and B.Tech (Computer Science — Cyber Security) student with hands-on experience in penetration testing, vulnerability assessment, and security monitoring using open-source tooling. Proficient in reconnaissance and exploitation workflows (Nmap, Shodan, Nessus, Metasploit, SQLMap), web application security (Burp Suite, OWASP Top 10 mitigations), network packet analysis (Wireshark), and SIEM/endpoint tooling (Splunk, Wazuh). Demonstrated ability to design controlled simulations of ransomware behavior and to deliver practical security solutions through projects and competitions. Actively building practical offensive and defensive skills via TryHackMe challenges and hackathons.
Lamrin Tech Skills University, Ropar, Punjab | 2023 – Present
Little Flower House Nagwa, Varanasi, Uttar Pradesh | 2023
Dalimss Sunbeam, Chakia Chandauli, Uttar Pradesh | June 2021
Reconnaissance → scanning → exploitation → post-exploitation workflows
Proxy/interception, injection validation, OWASP Top 10 mitigation
Packet capture, protocol analysis, anomaly detection
Log aggregation, alerting, incident triage
Security-focused OS environments
Automation, PoC scripts, secure coding principles
Professional communication and collaboration
Designed and maintain a tech website that aggregates tutorials, event updates, and instructional resources on cybersecurity topics. Organized content into practical learning tracks; provides resources for hands-on labs and links to assessed TryHackMe rooms.
IoT-driven automated lighting system that adjusts brightness based on ambient light to conserve energy. Implemented basic authentication and secure communication between nodes.
Electronic locker with multi-layer authentication (PIN + optional secondary factor). Created threat model for physical tampering and brute force attacks.
Controlled simulation that mimics common ransomware behaviors for training and defensive testing (file discovery, encryption simulation, persistence emulation) in an isolated lab environment. Designed to replicate TTPs safely without destructive payloads.
Practical understanding of top web app risks and mitigation strategies.
Hands-on tooling and methodology for ethical penetration testing with Kali Linux.
Advanced Nmap scanning techniques and structured reconnaissance workflows.
Core cybersecurity concepts, risk management, and basic defensive practices.
OS fundamentals relevant to security contexts.
Professional communication and presentation skills.
54th ISTE National Annual Convention & Yuva Kaushal Event, Lamrin TSU
College representative and participant in team challenges
Solved 50+ rooms (username: rajveerkushwaha9) to strengthen practical offensive and defensive skills
Runs a cybersecurity-focused YouTube channel (@raj-veerkushwaha) producing tutorials and walkthroughs
Organized a mini Cyberthon "Hack The Future" with 50+ participants to encourage hands-on learning
Varanasi, Uttar Pradesh, India
+91 9653005671
rajveerkushwaha9559@gmail.com