Experience

 
 
 
 
 

Full Stack Developer Intern

DXC Technologies

Mar 2021 – May 2021 New Delhi, India
I used Spring MVC, Hibernate, RESTful API, Docker and CI/CD while working on some projects.
 
 
 
 
 

Tech and Design Intern

ITISARAS

Aug 2020 – Nov 2020 New Delhi, India

Responsibilities included:

  • Designed a website for a registered non-profit organisation i.e., ITISARAS
  • Full Stack Development of a website for Project Dhaara
  • Designed an Editorial for Project Dhaara
 
 
 
 
 

Cybersecurity Research Intern

Defence Research and Development Organisation

Jun 2020 – Aug 2020 New Delhi, India

Worked under the supervision of Dr. Amit Dhawan at the Institute for Systems Studies & Analyses Lab to create an algorithm for use of data science to improve the cybersecurity of a desktop. Responsibilities included:

  • Researched on making cybersecurity more dependable
  • Developed an IDS for anomaly detection in connected IoTs
  • Designed a CLI for Malware Feature Extraction
 
 
 
 
 

Web Development intern

BBB Creations

May 2020 – Jun 2020 New Delhi, India

Responsibilities included:

  • Worked on the website of BBB creations
  • Used SEO tools for keyword selection
  • Learnt Social Media Marketing
  • Built a project i.e., Realize the New and applied all the things I learnt on the course of internship.

Certifications

ICS Cybersecurity Analysis & Evaluation (401V)

They breifly explained various factors for analysis and evaluation like identifying assets, determining dependencies etc., with help of hands-on exercises.
See certificate

Problem Solving (Basic)

Cleared Problem Solving (Basic) coding test in which competency area includes basic Data Structures and Algorithms
See certificate

301V Industrial Control Systems (ICS) Cybersecurity

I learnt all about metasploit, wireless security etc all related to Industrial Control System Cybersecurity.
See certificate

OPSEC for Control Systems

I learnt Operations security which is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.
See certificate

Introduction to Cybersecurity

They briefly explained why cybersecurity is important.
See certificate

Cybersecurity tools and technology

I was briefed about tools of cybersecurity in this course.
See certificate

Network Essentials and Implementation (Industrial Training)

They aquainted us with the study of networks in computer science
See certificate

Machine Learning (Summer Training)

We practically implemented concepts of machine learning
See certificate

Python App Development

They taught us how to build python web application using Flask
See certificate

Digital Marketing

learnt how to use digital marketing tools and wordpress
See certificate