Portfolio Website\index.html Cybersecurity Professional Portfolio
cybersecurity@portfolio:~
$ whoami

Priyesh EM

$ cat bio.txt

Cybersecurity Professional | Security Analyst | Penetration Tester | Threat Detection & Incident Response | Cloud & Network Security | Vulnerability & Risk Management | Identity & Access Management (IAM) | Governance, Risk & Compliance (GRC)

$ ./display-portfolio.sh

Initiating portfolio sequence...

$

About Me

Profile Picture

Cybersecurity Professional

I am a dedicated cybersecurity professional with expertise in vulnerability assessment, penetration testing, and security architecture. With a passion for protecting digital assets and infrastructure, I help organizations strengthen their security posture against evolving cyber threats.

My approach combines technical expertise with strategic thinking to identify vulnerabilities before they can be exploited. I believe in continuous learning to stay ahead in this ever-evolving field.

Security Assessments

25+

Vulnerabilities Found

100+

Certifications

5+

Education

Master of Science in Cybersecurity in Computer Science

The George Washington University

January 2024 - (December 2025) Washington, DC
  • Focused on offensive and defensive cybersecurity techniques, including penetration testing, vulnerability assessment, incident response, and cyber threat intelligence
  • Engaged in research on machine learning-driven intrusion detection systems and automated threat response strategies
  • Hands-on experience with real-world scenarios in security operations, red teaming, malware analysis, and network forensics
  • Relevant coursework: Advanced Network Security, Computer Security, Cloud Computing and Security applications, E-Commerce Security , Computer Network Defence
  • GPA: 3.5/4.0

Master of Science in System Security

Symbiosis International University - SICSR

June 2020 - May 2022 Pune, MH - India
  • Specialized in system and infrastructure security, focusing on threat modeling, secure system architecture, and endpoint protection
  • Gained practical experience in areas such as ethical hacking, vulnerability exploitation, malware analysis, and Penetration Testing
  • Conducted academic projects on secure operating systems, network intrusion detection, and risk assessment frameworks
  • Relevant coursework: Information Security Governance, Operating System Security, Cryptography, Network Security, Cyber Laws & Ethics
  • GPA: 7.54/10.0

Bachelor of Computer Applications

Vijayanagara Sri Krishnadevaraya University - SGT College

July 2017 - May 2020 Ballari, KA - India
  • Built a strong foundation in computer science fundamentals, with emphasis on networking, system architecture, and programming principles essential for cybersecurity
  • Developed key skills in data structures, algorithms, and object-oriented programming, forming a base for secure coding practices
  • Gained hands-on exposure to operating systems, database management, and computer networks—core pillars in system security and incident response
  • Relevant coursework: Database Management System, Operating System, Java, Artificial Intelligence, and Computer Networks
  • GPA: 8.70/10.0

Professional Experience

Technology Risk Management Analyst - Business Consulting

Ernest and Young - Global Delivery Services

June 2022 - December 2023 Bengaluru, India
  • Oversaw more than ten technological, business, and security audits to ensure adherence to industry standards
  • Contributed to two major projects focused on audit automation, compliance monitoring, and security tool enhancements, improving operational efficiency by 30%
  • Optimized data analysis workflows using advanced Excel functions, reducing manual effort in compliance reporting by 40%
  • Collaborated with IT teams to enforce security controls and worked with IT Automated and General Controls

Penetration Tester - Intern

Illumine Career Center

January 2022 - May 2022 Ballari, India
  • Led over five front-end development projects, enhancing application responsiveness by 30% and improving UI/UX capabilities
  • Assisted in security architecture reviews and identified potential weaknesses in system designs
  • Conducted network monitoring and penetration testing, identifying and remediating over 12 security vulnerabilities
  • Strengthened system defenses by managing access-control systems with role-based access and secure authentication, leading to a 25% decrease in unauthorized access incidents
  • Provided IT support ensuring 99.0% system uptime, resolving technical issues, and streamlining digital system processes to boost productivity

Technical Skills

Security

Penetration Testing 90%
Vulnerability Assessment 85%
Incident Response & Threat Detection 80%
Governance, Risk & Compliance (GRC) 75%
Cloud Security (AWS, Azure) 75%
Identity & Access Management (IAM) 80%

Programming

Python 85%
Bash Scripting 85%
PowerShell 75%
SQL & Linux Scripting 70%
Java & C++ 75%

Tools & Technologies

Metasploit 90%
Wireshark 85%
Nmap 95%
Splunk & SIEM Tools 80%
Microsoft Azure AD 75%
Burp Suite 85%
Nessus & OpenVAS 80%
Firewalls & Network Security 75%

Featured Projects

Project 5

SIEM Sentinel

A lightweight, web-based SIEM tool built with Python and Flask for real-time security log analysis. It features automated threat detection (e.g., brute-force, port scans), IP geolocation enrichment, and an interactive dashboard for managing alerts and visualizing threat trends.

InfoSec Tools Security Log Analysis Automated Threat Detection Python Flask App Brute-force & Port Scan Detection
Project 4

CTI - Dashboard

A sleek, Flask-based Cyber Threat Intelligence (CTI) dashboard that visualizes and filters IP reputation data using AbuseIPDB API. Designed for security analysts to investigate malicious IPs through an interactive, cyber-themed interface.

Cyber Threat Intelligence IP Reputation Flask Application Python Security Tools Interactive Data Visualization
Project 3

MOM - My Own Medic

AI-powered personalized health assistant coupled with EHRs using FHIR API to provide real-time health monitoring, predictive analytics, and proactive recommendations while maintaining HIPAA-compliant security and seamless integration with wearable devices for enhanced user health insights.

AI-Powered Healthcare EHR Integration Predictive Analytics HIPAA Compliance FHIR API
Project 2

Echo Client - Server Encryption

Developed a hybrid encryption system for an echo client-server with secure RSA key pair generation for key exchange. The client encrypts a symmetric AES key and HMAC key with RSA (OAEP padding) for end-to-end data confidentiality. Used AES-CBC mode for encryption and SHA-256 for HMAC, providing improved data integrity and security.

Network Security Symmetric Key Encryption End-to-End Encryption Client-Server Architecture
Project 1

CIDS - Cyber intrusion detection and notifying systems using ML approaches

Created a machine learning-based intrusion detection system that can identify and classify over 10 cyber-attacks with 90%+ accuracy. The system includes an alerting system for real-time detection of potential threats, allowing for immediate notification of administrators and enhanced proactive threat removal and network security.

Machine Learning Intrusion Detection Threat Intelligence Anomaly Detection

Hackathon Achievements

Finalist

George Hacks 2025

February 2025 | Washington D.C.

Developed MOM (My Own Medic) - an AI-powered medical assistant integrating Electronic Health Records (EHRs) for real-time health insights, alerts, and personalized care. Focused on HIPAA-compliant security, wearable integration, and predictive analytics for proactive healthcare management.

AI/ML Integration EHR Security HealthTech
Participant

TryHackMe Capture the Flag

March 2025 | Virtual Event

Participated in a 24-hour cybersecurity CTF challenge focused on real-world attack scenarios. Completed advanced penetration testing labs, reverse engineering, and exploitation tasks across red team simulations. Achieved top scores across multiple modules.

Penetration Testing Red Team Ops Network Exploitation

Publications

A Machine Learning based Novel Cyber Intrusion Detection System for Network Administration

Accepted for publication in the top Q1 and Q2 journal, 2024

Priyesh EM, Nagaraj S, Ramkumar K

Designed a Machine Learning-based Cyber Intrusion Detection System (CIDS) to detect and classify multiple types of cyber-attacks in real-time. The system alerts users instantly via platforms like email and Telegram, ensuring early detection, reduced false alarms, and improved response time.

Cryptography System for Securing Data Image in Fog Computing

Accepted for publication in the top Q1 and Q2 journal, 2024

Priyesh EM, Ravi Kumar, Shaik J, Sureka Y

Developed a cryptographic system to securely transmit image data in fog computing environments. The system enhances data privacy and integrity by applying encryption techniques that defend against unauthorized access and cyber threats in distributed edge networks.

Ethical Hacking: Understanding the Security Landscape

Accepted for publication in the top Q1 and Q2 journal, 2024

Priyesh EM, Ravi Kumar, Lalitha K, Ramakrishna R

Created a deep learning model that detects cyberbullying in social media posts by analyzing language pattern and contextual sentiment. The system facilitates the early identification of dangerous content to ensure safer digital interactions and online communities.

Certifications

AWS Certified Security – Specialty (SCS-C02)

Amazon Web Services (AWS)

Validation ID: ee49b2ec6e75482aadc66b 4bd9325f0c

Issued: June 2025

Red Hat System Administration II (RH134 - RHA)

Red Hat

Issued: May 2025

Red Hat OpenShift Administration I (DO180 - RHA)

Red Hat

Issued: April 2025

AWS Academy Cloud Security Builder

Amazon Web Services (AWS)

Issued: April 2025

Red Hat System Administration I (RH124 - RHA)

Red Hat

Issued: April 2025

AWS Academy Cloud Operations

Amazon Web Services (AWS)

Issued: March 2025

AWS Academy Cloud Security Foundations

Amazon Web Services (AWS)

Issued: March 2025

Career Essentials in Cybersecurity

Microsoft & LinkedIn

Issued: January 2025

AWS Academy Cloud Foundations

Amazon Web Services (AWS)

Issued: January 2025

Cybersecurity Analyst Job Simulation

Tata Group - Forage

Issued: January 2025

Google Cybersecurity Specialization

Google

Issued: October 2024

Cybersecurity Certification (PG Diploma)

NIT Rourkela

Credential ID: FSEMMJ8C

Issued: January 2023

Introduction to Programming Using Python

Institute of Advanced Network Technology - IANT

Credential ID: KAR-BL-22-06-0007

Issued: December 2022

Leadership

President

Desis Organization, George Washington University 2024 - Present

Leading a student board in delivering cultural, academic, and community support initiatives for 250+ Indian graduate students at George Washington University, fostering inclusion and student engagement

  • Planned and executed 5+ high-impact cultural events, increasing international student participation by 60%
  • Recruited and mentored executive board members, improving team coordination and leadership continuity
  • Built partnerships with university departments to advocate for international student support and resources

Vice President

Google Developer Student Club, George Washington University 2024 - Present

Serving as Vice President of the Google Developer Student Club, empowering students through technical workshops, hands-on projects, and developer community engagement

  • Organized 5+ technical sessions on topics like web development, cloud computing, and cybersecurity fundamentals
  • Coordinated cloud labs with open-source tools and coding challenges, increasing active club participation by 70%
  • Fostered collaboration with other student clubs and tech communities to expand learning opportunities

Contact Me

Location

Arlington, Virginia