terminal — jasstej@kali
$ whoami
Jasstej Singh Marwaha
Cybersecurity Researcher | B.Tech CSE Student
Punjab, India
$

About Me

I am a B.Tech Computer Science & Engineering student specializing in Cybersecurity, with a strong focus on offensive security, vulnerability research, and real-world attack simulations. I actively engage in hands-on labs, Capture The Flag (CTF) competitions, and security research to sharpen my technical and analytical skills.

My experience includes cloud security, Linux system administration, Active Directory environments, and practical exploitation techniques. I am passionate about identifying security weaknesses, understanding adversarial tactics, and building secure, resilient infrastructures.

I continuously challenge myself through competitive cybersecurity events and real-world problem-solving environments, aiming to grow as a security researcher and contribute meaningfully to the cybersecurity community.

AIR 19 — Pentathon 2025 (NCIIPC–AICTE)
AWS Certified
Cybersecurity Research & Internships
Hands-on labs, CTFs, and tooling
Jr Penetration Tester — TryHackMe
Pre Security Certificate — TryHackMe
AWS Academy Graduate — Data Center Technician
Red Hat System Administration I & II (RH124 / RH134)
Red Hat Ansible Automation (DO457)
Palo Alto Networks — Cybersecurity Foundation
Tata Group — Cybersecurity Analyst Simulation

Core Skills

Offensive Security

  • Web Application Penetration Testing (OWASP Top 10)
  • Vulnerability Assessment & Manual Exploitation
  • Reconnaissance & Enumeration (Subdomain, Endpoint, Parameter Discovery)
  • Real-world CTF Exploitation & Vulnerability Chaining
  • Active Directory Security Concepts

Defensive & Awareness

  • Cyber Crime Prevention & Security Awareness
  • Incident Response Fundamentals
  • Digital Forensics Fundamentals
  • Log Analysis & Basic Threat Investigation

Tools & Platforms

  • Kali Linux
  • Burp Suite
  • Nmap
  • Wireshark
  • Metasploit
  • Linux Command Line & System Hardening

Programming & Automation

  • Python (Security Automation & Custom Scripts)
  • Bash Scripting
  • PowerShell Basics
  • Workflow Automation for Recon & Analysis

Experience & Training

Cybersecurity Intern / Trainee

Amroha Police Cyber Security Internship Program (2K25)

  • Exposure to cybercrime investigation workflows
  • Awareness campaigns & case analysis

Security Research & Practice

Independent

  • CTF participation (Pentathon, labs, self-practice)
  • Independent security research & tooling

Community & Leadership

AIESEC | IMPunjab | GU-TBI

  • Security & tech involvement
  • Team collaboration & event coordination

Projects

Web Recon Automation Toolkit

Python-based reconnaissance and vulnerability discovery workflow

approach: Automated subdomain enumeration, port scanning, and vulnerability fingerprinting

Python Nmap Sublist3r

Metadata Nuker

Tool to safely remove metadata from files before sharing

approach: Scans and strips EXIF and embedded metadata from images and documents

Python ExifTool Privacy

DeVulDecompiler

Decompiler tool targeting vulnerable binaries for analysis

approach: Performs automated binary decompilation and vulnerability pattern scanning

Python Reverse Engineering Security

ActiveDirectory Toolkit

Scripts and tools for querying and interacting with Active Directory

approach: Automates enumeration of users, groups, and ACLs in Windows environments

PowerShell Active Directory Cybersecurity

File Share Server

Simple Python server for secure file sharing over a network

approach: Implements HTTP upload/download endpoints with access control and logging

Python Flask Networking

Password Checker

Utility to analyze strength and compliance of user passwords

approach: Checks password structure, entropy, rules, and common patterns

Python Security CLI

Linux Hardening & Security Labs

Practical system security experiments

approach: Configured firewalls, SELinux policies, and intrusion detection on lab environments

Kali Linux iptables Snort

JSIntelliHawk

JavaScript security analysis and vulnerability detection tool

approach: Scans JS files for vulnerable libraries, detects sensitive data leaks, and maps security endpoints with Web GUI

Python JavaScript Web Security React

Network Scanner & Monitor

Real-time network scanning and device monitoring with comprehensive discovery methods

approach: Multi-method ARP and ping sweep scanning, real-time device tracking, port enumeration, and vendor identification

Python Network Security ARP Scanning Nmap

Certifications & Achievements

🏅

AWS Certification

Cloud security fundamentals

🏆

AIR 19 — Pentathon 2025

National Level CTF by NCIIPC–AICTE

🎓

Cybersecurity Training & Internships

Hands-on practical training programs

Get In Touch

$ contact --jasstej