cybersecurity@portfolio:~
$ whoami

Priyesh EM

$ cat bio.txt

Cybersecurity Professional | Security Analyst | Penetration Tester | Threat Detection & Incident Response | Cloud & Network Security | Vulnerability & Risk Management | Identity & Access Management (IAM) | Governance, Risk & Compliance (GRC)

$ ./display-portfolio.sh

Initiating portfolio sequence...

$

About Me

Profile Picture

Cybersecurity Professional

I am a dedicated cybersecurity professional with expertise in vulnerability assessment, penetration testing, and security architecture. With a passion for protecting digital assets and infrastructure, I help organizations strengthen their security posture against evolving cyber threats.

My approach combines technical expertise with strategic thinking to identify vulnerabilities before they can be exploited. I believe in continuous learning to stay ahead in this ever-evolving field.

Security Assessments

25+

Vulnerabilities Found

100+

Certifications

5+

Education

Master of Science in Cybersecurity in Computer Science

The George Washington University

January 2024 - (December 2025) Washington, DC
  • Focused on offensive and defensive cybersecurity techniques, including penetration testing, vulnerability assessment, incident response, and cyber threat intelligence
  • Engaged in research on machine learning-driven intrusion detection systems and automated threat response strategies
  • Hands-on experience with real-world scenarios in security operations, red teaming, malware analysis, and network forensics
  • Relevant coursework: Advanced Network Security, Computer Security, Cloud Computing and Security applications, E-Commerce Security , Computer Network Defence
  • GPA: 3.5/4.0

Master of Science in System Security

Symbiosis International University - SICSR

June 2020 - May 2022 Pune, MH - India
  • Specialized in system and infrastructure security, focusing on threat modeling, secure system architecture, and endpoint protection
  • Gained practical experience in areas such as ethical hacking, vulnerability exploitation, malware analysis, and Penetration Testing
  • Conducted academic projects on secure operating systems, network intrusion detection, and risk assessment frameworks
  • Relevant coursework: Information Security Governance, Operating System Security, Cryptography, Network Security, Cyber Laws & Ethics
  • GPA: 7.54/10.0

Bachelor of Computer Applications

Vijayanagara Sri Krishnadevaraya University - SGT College

July 2017 - May 2020 Ballari, KA - India
  • Built a strong foundation in computer science fundamentals, with emphasis on networking, system architecture, and programming principles essential for cybersecurity
  • Developed key skills in data structures, algorithms, and object-oriented programming, forming a base for secure coding practices
  • Gained hands-on exposure to operating systems, database management, and computer networks—core pillars in system security and incident response
  • Relevant coursework: Database Management System, Operating System, Java, Artificial Intelligence, and Computer Networks
  • GPA: 8.70/10.0

Professional Experience

Student Academic Assistant - Algorithms and Data Structures

The George Washington University – School of Engineering & Applied Science

September 2025 - Ongoing Washington - DC, USA
  • Mentored undergraduate students in algorithmic problem solving and data structures, including recursion, sorting, trees, graphs, and dynamic programming
  • Automated grading and feedback workflows using Python scripts, improving evaluation efficiency and ensuring consistent assessment
  • Applied programming logic to develop scalable support tools for the course, enhancing productivity and accuracy
  • Linked algorithmic foundations to secure system design and threat detection, reinforcing cybersecurity principles through teaching
  • Collaborated with faculty to conduct technical review sessions and support student learning through structured academic guidance

Technology Risk Management Analyst - Business Consulting

Ernest and Young - Global Delivery Services

June 2022 - December 2023 Bengaluru, India
  • Oversaw more than ten technological, business, and security audits to ensure adherence to industry standards
  • Contributed to two major projects focused on audit automation, compliance monitoring, and security tool enhancements, improving operational efficiency by 30%
  • Optimized data analysis workflows using advanced Excel functions, reducing manual effort in compliance reporting by 40%
  • Collaborated with IT teams to enforce security controls and worked with IT Automated and General Controls

Penetration Tester - Intern

Illumine Career Center

January 2022 - May 2022 Ballari, India
  • Led over five front-end development projects, enhancing application responsiveness by 30% and improving UI/UX capabilities
  • Assisted in security architecture reviews and identified potential weaknesses in system designs
  • Conducted network monitoring and penetration testing, identifying and remediating over 12 security vulnerabilities
  • Strengthened system defenses by managing access-control systems with role-based access and secure authentication, leading to a 25% decrease in unauthorized access incidents
  • Provided IT support ensuring 99.0% system uptime, resolving technical issues, and streamlining digital system processes to boost productivity

Security Engineer

Revisewell

January 2020 - December 2021 Ballari, India
  • Assisted in developing cybersecurity policies and procedures aligned with the CIS framework as part of the security team’s foundational efforts.
  • Supported the configuration of AWS cloud security components, including IAM roles, VPC security groups, and S3 access policies.
  • Contributed to incident response activities by helping with log analysis, initial triage, and documentation of findings.
  • Participated in the vulnerability management process, helping to scan systems and track remediation efforts across Windows and Linux environments.
  • Helped configure basic SIEM alerts and supported threat hunting tasks using predefined queries and security tools.
  • Wrote simple Python and PowerShell scripts to assist with repetitive tasks such as log parsing and report generation.
  • Supported IAM operations by helping enforce access controls and assist in enabling MFA for internal users.

Technical Skills

Security

Incident Response & Digital Forensics (DFIR) 90%
Penetration Testing & Offensive Security 85%
Governance, Risk & Compliance (GRC) 90%
Cloud Security Architecture (AWS/Azure) 85%
IT Controls Testing (SOX, SOC 2, ISO 27001) 85%
Threat Intelligence & Hunting 80%
Vulnerability Management & Assessment 90%

Programming

Python (for Security Automation) 90%
Bash & Linux Scripting 85%
PowerShell 80%
SQL 75%
Go, Java & C++ 65%
Web (HTML, JS, PHP) 60%

Tools & Technologies

AWS (IAM, EC2, S3, VPC, GuardDuty) 90%
SIEM (Splunk, QRadar, ELK) & SOAR 85%
Metasploit, Burp Suite & Nmap 90%
Vulnerability Scanners (Nessus, Qualys) 90%
Forensic Tools (Volatility, Wireshark, FTK) 80%
Operating Systems (Linux, Windows Server) 90%
Terraform & Ansible 70%

Featured Projects

Project SwapStack

SwapStack

A peer-to-peer platform that uses AI to deliver instant, fair market valuations for used electronics. Users upload images and descriptions, and the system leverages real-time web data to provide objective, data-driven pricing.

AI Valuation Engine P2P Marketplace Real-Time Data Scraping Full-Stack Integration Product Pricing Automation
Agentic AI Hackathon Project

Agentic AI Research Strategist

Built during the Google Cloud Hackathon, this AI agent transforms vague prompts into structured research plans using Google Gemini. It generates full R&D strategies including NLU design, dialog flow, response generation, and deployment guidance streamlining ideation with agentic AI.

Agentic AI Google Gemini LLM Apps Research Automation RAG-based Planning
Project 5

SIEM Sentinel

A lightweight, web-based SIEM tool built with Python and Flask for real-time security log analysis. It features automated threat detection (e.g., brute-force, port scans), IP geolocation enrichment, and an interactive dashboard for managing alerts and visualizing threat trends.

InfoSec Tools Security Log Analysis Automated Threat Detection Python Flask App Brute-force & Port Scan Detection
Project 4

CTI - Dashboard

A sleek, Flask-based Cyber Threat Intelligence (CTI) dashboard that visualizes and filters IP reputation data using AbuseIPDB API. Designed for security analysts to investigate malicious IPs through an interactive, cyber-themed interface.

Cyber Threat Intelligence IP Reputation Flask Application Python Security Tools Interactive Data Visualization
Project 3

MOM - My Own Medic

AI-powered personalized health assistant coupled with EHRs using FHIR API to provide real-time health monitoring, predictive analytics, and proactive recommendations while maintaining HIPAA-compliant security and seamless integration with wearable devices for enhanced user health insights.

AI-Powered Healthcare EHR Integration Predictive Analytics HIPAA Compliance FHIR API
Project 2

Echo Client - Server Encryption

Developed a hybrid encryption system for an echo client-server with secure RSA key pair generation for key exchange. The client encrypts a symmetric AES key and HMAC key with RSA (OAEP padding) for end-to-end data confidentiality. Used AES-CBC mode for encryption and SHA-256 for HMAC, providing improved data integrity and security.

Network Security Symmetric Key Encryption End-to-End Encryption Client-Server Architecture
Project 1

CIDS - Cyber intrusion detection and notifying systems using ML approaches

Created a machine learning-based intrusion detection system that can identify and classify over 10 cyber-attacks with 90%+ accuracy. The system includes an alerting system for real-time detection of potential threats, allowing for immediate notification of administrators and enhanced proactive threat removal and network security.

Machine Learning Intrusion Detection Threat Intelligence Anomaly Detection

Hackathon Achievements

Participant

AI FinTech Hackathon – Cerebral Valley

Aug 2025 | New York

Developed an AI-powered peer-to-peer platform that delivers instant, fair market valuations for used electronics. The system leverages Brave Search API and Claude LLM to analyze real-time pricing data, ensuring accurate, transparent, and trust-based exchanges between users while showcasing the potential of AI-driven FinTech innovation.

AI Valuation Claude LLM Real-Time Data Extraction P2P Platform Full-Stack Web App AI for Market Analysis
Participant

Agentic AI Hackathon – Google Cloud

July 2025 | Washington D.C.

Built an AI agent that turns vague prompts into full-fledged research and product development strategies. The system uses Google Gemini to auto-generate structured R&D plans—ranging from NLU engine design to deployment recommendations—mimicking real-world ideation workflows. Designed to showcase the future of agentic productivity and creative automation.

Agentic AI Google Gemini LLM Apps AI for Research
Finalist

George Hacks 2025

February 2025 | Washington D.C.

Developed MOM (My Own Medic) - an AI-powered medical assistant integrating Electronic Health Records (EHRs) for real-time health insights, alerts, and personalized care. Focused on HIPAA-compliant security, wearable integration, and predictive analytics for proactive healthcare management.

AI/ML Integration EHR Security HealthTech
Participant

TryHackMe Capture the Flag

March 2025 | Virtual Event

Participated in a 24-hour cybersecurity CTF challenge focused on real-world attack scenarios. Completed advanced penetration testing labs, reverse engineering, and exploitation tasks across red team simulations. Achieved top scores across multiple modules.

Penetration Testing Red Team Ops Network Exploitation

Publications

A Machine Learning based Novel Cyber Intrusion Detection System for Network Administration

Accepted for publication in the top Q1 and Q2 journal, 2024

Priyesh EM, Nagaraj S, Ramkumar K

Designed a Machine Learning-based Cyber Intrusion Detection System (CIDS) to detect and classify multiple types of cyber-attacks in real-time. The system alerts users instantly via platforms like email and Telegram, ensuring early detection, reduced false alarms, and improved response time.

Cryptography System for Securing Data Image in Fog Computing

Accepted for publication in the top Q1 and Q2 journal, 2024

Priyesh EM, Ravi Kumar, Shaik J, Sureka Y

Developed a cryptographic system to securely transmit image data in fog computing environments. The system enhances data privacy and integrity by applying encryption techniques that defend against unauthorized access and cyber threats in distributed edge networks.

Ethical Hacking: Understanding the Security Landscape

Accepted for publication in the top Q1 and Q2 journal, 2024

Priyesh EM, Ravi Kumar, Lalitha K, Ramakrishna R

Created a deep learning model that detects cyberbullying in social media posts by analyzing language pattern and contextual sentiment. The system facilitates the early identification of dangerous content to ensure safer digital interactions and online communities.

Certifications

GitHub Copilot

GitHub - Microsoft

Validation ID: 81BLF0-44195B

Issued: October 2025

CompTIA Security+ - SY0-701

CompTIA

Validation ID: BXR7LYE58BF15D7J

Issued: July 2025

AWS Certified Security – Specialty (SCS-C02)

Amazon Web Services (AWS)

Validation ID: ee49b2ec6e75482aadc66b 4bd9325f0c

Issued: June 2025

Red Hat System Administration II (RH134 - RHA)

Red Hat

Issued: May 2025

Red Hat OpenShift Administration I (DO180 - RHA)

Red Hat

Issued: April 2025

AWS Academy Cloud Security Builder

Amazon Web Services (AWS)

Issued: April 2025

Red Hat System Administration I (RH124 - RHA)

Red Hat

Issued: April 2025

AWS Academy Cloud Operations

Amazon Web Services (AWS)

Issued: March 2025

AWS Academy Cloud Security Foundations

Amazon Web Services (AWS)

Issued: March 2025

Career Essentials in Cybersecurity

Microsoft & LinkedIn

Issued: January 2025

AWS Academy Cloud Foundations

Amazon Web Services (AWS)

Issued: January 2025

Cybersecurity Analyst Job Simulation

Tata Group - Forage

Issued: January 2025

Google Cybersecurity Specialization

Google

Issued: October 2024

Cybersecurity Certification (PG Diploma)

NIT Rourkela

Credential ID: FSEMMJ8C

Issued: January 2023

Introduction to Programming Using Python

Institute of Advanced Network Technology - IANT

Credential ID: KAR-BL-22-06-0007

Issued: December 2022

Leadership

President

Desis Organization, George Washington University 2024 - Present

Leading a student board in delivering cultural, academic, and community support initiatives for 250+ Indian graduate students at George Washington University, fostering inclusion and student engagement

  • Planned and executed 5+ high-impact cultural events, increasing international student participation by 60%
  • Recruited and mentored executive board members, improving team coordination and leadership continuity
  • Built partnerships with university departments to advocate for international student support and resources

Vice President

Google Developer Student Club, George Washington University 2024 - Present

Serving as Vice President of the Google Developer Student Club, empowering students through technical workshops, hands-on projects, and developer community engagement

  • Organized 5+ technical sessions on topics like web development, cloud computing, and cybersecurity fundamentals
  • Coordinated cloud labs with open-source tools and coding challenges, increasing active club participation by 70%
  • Fostered collaboration with other student clubs and tech communities to expand learning opportunities

Contact Me

Location

Arlington, Virginia