CLASSIFICATION: OPEN  ·  FILE: PN-2026-SEC  ·  LOCATION: MUMBAI, IN
DEGREE: B.TECH CYBERSECURITY (HONS. AI/ML)  ·  CERTS: CEH v13 · ISC2 CC
SUBJECT
PURVA
NALAWADE
CLEARED
Authorization: Level III
I work at the intersection of offensive security and secure system design.
My experience includes web application VAPT aligned with OWASP standards, vulnerability validation,
structured security reporting, and exposure to real-world cyber defense workflows.

Previously, I worked as a Full Stack Development Intern at Millennium Enterprise, where I built
secure end-to-end web applications and implemented authentication, input validation,
and backend logic with security-first practices.
Open to opportunities Maharashtra Cyber · CyberPeace · DeepCytes Red Teaming · Web App Security · Threat Analysis · Secure Architecture
View Casefile Download Resume Make Contact
01
FIELD OPERATIONS
ACTIVE  January 2026 — Present · Mumbai
Maharashtra Cyber
Cyber Security Intern
Gaining hands-on exposure to state-level cyber defense operations, SOC architecture, and enterprise threat monitoring workflows.
  • Studying Security Operations Center (SOC) architecture and incident response lifecycle processes.
  • Gaining exposure to enterprise SIEM monitoring using IBM QRadar for real-time threat detection.
  • Exploring Attack Surface Management (ASM) methodologies to understand digital footprint mapping and external risk visibility.
  • Analyzing security telemetry and log patterns for threat identification and escalation workflows.
SOC ArchitectureQRadar SIEMASMSecurity Telemetry
ACTIVE  January 2026 — Present · Remote
CyberPeace Foundation
Project Intern · Centre of Excellence
Contributing to cybersecurity and AI-safety research initiatives, including development of AI-AwareX — an explainable, deterministic cybersecurity risk detection platform.
  • Designed modular system architecture with a central routing layer and stateless detection modules.
  • Implemented heuristic-based PII, AI-text likelihood, and image manipulation detection workflows.
  • Built deterministic risk scoring logic with unified reporting and database-backed audit persistence.
  • Contributed to structured documentation and AI governance design discussions.
Secure ArchitectureDeterministic DetectionAI SafetyRisk Modeling
July 2025 — December 2025 · Remote / Hybrid
DeepCytes Cyber Labs
Red Team Intern
Worked as a Red Team Intern focusing on web application security testing, vulnerability validation, and structured security reporting aligned with OWASP standards.
  • Performed web application VAPT including authentication testing, input validation flaws, and business logic analysis.
  • Used Burp Suite, Nmap, Metasploit, and Wireshark for reconnaissance and controlled exploitation.
  • Documented findings with risk ratings, proof-of-concept steps, and remediation guidance.
  • Participated in controlled attack simulation exercises within lab environments.
Web App VAPTVulnerability AssessmentBurp SuiteSecurity Reporting
March 2025 — June 2025 · Remote / Hybrid
Millennium Enterprise
Full Stack Development Intern
Completed a 3-month internship building secure end-to-end web applications with a security-first development approach.
  • Built responsive web interfaces using HTML, CSS, JavaScript, and React.
  • Developed REST APIs and backend logic using Node.js and MongoDB.
  • Implemented authentication flows, input validation, and secure session handling.
  • Applied secure coding practices to reduce common vulnerabilities (XSS, injection, improper validation).
Full Stack DevSecure CodingREST APIsAuth Design
02
CASE FILES
01
Hackathon Finalist · Top 10 — Idea Hackathon
Phishers — Phishing URL Detection & Automated Takedown Coordination
Developed a centralized platform to detect and coordinate the takedown of phishing domains targeting public sector banks. The solution integrates AI-based phishing detection, real-time reporting, and global registrar coordination to streamline cross-jurisdictional takedown efforts and reduce response time.
PythonFlaskscikit-learnWHOIS/DNSAbuseIPDB APIOTX Threat FeedsCeleryRedis
02
GuardrailX — Defense-in-Depth Governance Layer for Generative AI
Built a programmable safety framework that sits between users and Large Language Models (LLMs) to enforce policy, detect jailbreak attempts, prevent sensitive data leakage, and log auditable safety decisions. Core features: prompt/response risk inspection, jailbreak detection, sanitization controls, automated LLM red-team simulator, bypass rate measurement, latency tracking, safety scorecard generation.
AI Safety EngineeringLLM Red TeamingDefensive AI Infrastructure
03
AI-AwareX — Explainable & Deterministic Cybersecurity Risk Detection Platform
A privacy-preserving cybersecurity platform built to counter AI-driven threats including deepfakes, phishing automation, and data leakage. Built on a React.js and Django stack, it integrates forensic diagnostics, adversarial simulation, and active defense into a single ecosystem. Its core innovation — a Compression-Resistant Adversarial Cloak — generates platform-specific noise that survives social media compression to protect biometric identity. A Zero-Knowledge Adversarial Threat Twin (Z-KATT) engine safely simulates realistic cyberattacks using synthetic, legally compliant data, performing adversarial manipulation, forensic delta analysis, and risk scoring without touching real user data.
DjangoPresidiospaCyPostgreSQLAI SafetyDeterministic Detection
04
Revenant — Automated Zombie API Discovery & Defence Platform
Banks accumulate thousands of forgotten API endpoints over years of digital transformation. Revenant scans across 6 discovery vectors — network, API gateways, code repositories, CI/CD pipelines, and traffic logs — to build a complete API inventory, classifying every endpoint as Active, Deprecated, Orphaned, or Zombie. Confirmed zombie APIs are routed through an automated decommissioning workflow covering owner identification, gateway blocking, and repository cleanup. A built-in Risk Correlator maps APIs against the OWASP API Top 10, runs CVE lookups, detects PII exposure, and assesses regulatory impact against RBI, PCI-DSS, and DPDP Act 2023.
API SecurityOWASP API Top 10CVE DetectionPII Exposure AnalysisCI/CD IntegrationRBI / PCI-DSS / DPDP Act 2023Decommissioning Automation
05
Consolation Prize Winner · Top 10 — CCTV Surveillance Security & Forensics Hackathon 2.0
Harden the Grid — Cyber Defence for CCTV Infrastructure
Designed a multi-layered, zero-trust cybersecurity architecture to protect CCTV networks against hacking and data breaches. Secured the full pipeline from IP camera to NVR using VPN tunnels, TLS encryption, and RBAC with continuous identity verification. A network-based IDS/IPS monitored traffic using signature- and anomaly-based detection, while threat intelligence feeds dynamically updated detection rules. Attack vectors including RTSP hijacking, credential brute-forcing, and MITM attacks were simulated in controlled environments to validate detection and response capabilities end-to-end.
Flasknginx (NVR)WireGuardTLS/HTTPSKeycloak RBAC/MFASuricata IDS/IPSAbuseIPDB
06
Swiss Army Knife — Multi-Purpose Cybersecurity Utility Tool
Developed a multi-utility cybersecurity toolkit that integrates several common offensive and defensive features into a single interface — functioning as a "Swiss Army Knife" for security testing, reconnaissance, and quick incident response.
PythonFlask/TkinterRequestsSocketOSINT APIsNmapHashlibCryptography
07
Book Recommendation System
Built a personalized book recommendation system that suggests titles based on user preferences and book similarities. The model uses both collaborative and content-based filtering to enhance recommendation accuracy and user engagement.
Pythonpandasscikit-learnNumPyStreamlit/FlaskCosine SimilarityCollaborative Filtering
03
TECHNICAL INVENTORY

Security is just good engineering.

CategoryTools & Skills
ProgrammingC · Python · Bash · SQL
Platforms & OSLinux (Kali / Ubuntu) · Windows
Security ToolsNmap · Wireshark · Metasploit · Burp Suite · Autopsy · Git & GitHub
Web SecurityWeb App VAPT (OWASP) · Vulnerability Validation · Basic Exploitation & Enumeration · Structured Security Reporting
Cyber DomainsNetwork Security · IDS/IPS Concepts · Threat Intelligence · OSINT · Digital Forensics · AI in Cybersecurity
Web DevHTML · CSS · JavaScript · React · Next.js · Secure Auth & Input Validation
Soft SkillsLeadership · Communication · Analytical Thinking · Adaptability · Team Collaboration · Time Management
04
EDUCATION
2023–
Present
Current
Shah & Anchor Kutchhi Engineering College
B.Tech Cybersecurity with Honours in AI/ML
2021–
2023
Completed
Peoples Education Society
2021 – 2023
2015–
2021
Completed
Holy Cross Convent High School
2015 – 2021
05
CERTIFICATIONS
Jul
2025
EC-Council
Certified Ethical Hacker (CEH v13)
Demonstrated advanced understanding of ethical hacking methodologies, penetration testing, and exploit analysis. Achieved a score of 118 in the CEH examination.

Skills: Penetration Testing · Vulnerability Assessment · Exploit Development · Malware Analysis · Network Defense
Jun
2025
ISC²
Certified in Cybersecurity (CC)
Earned the globally recognized Certified in Cybersecurity (CC) credential, validating fundamental knowledge in information security principles, network security, incident response, and security operations.

Skills: Cybersecurity Concepts · Access Control · Network Security · Security Operations · Risk Management
May
2025
TryHackMe
Web Fundamentals & Junior Penetration Tester
Hands-on training in ethical hacking, web exploitation, and security assessment through interactive labs and real-world attack simulations.

Skills: Web Security · Penetration Testing · Reconnaissance · Vulnerability Exploitation
Feb
2025
Fortinet · AICTE
Fortinet Certified Associate (FCA) & Fundamentals (FCF)
Gained expertise in cybersecurity fundamentals, network security concepts, and the use of Fortinet Security Fabric tools through a structured virtual internship program.

Skills: FortiGate Configuration · Threat Mitigation · Secure Network Design
Oct
2024
Zscaler · AICTE
Zscaler Virtual Internship Certificate
Completed a virtual internship focusing on Zero Trust architecture, cloud security, and secure access service edge (SASE) models.

Skills: Zero Trust · Cloud Security · Web Gateway Protection
Sep
2024
Palo Alto Networks · AICTE
Palo Alto Networks Cybersecurity Fundamentals
Completed a cybersecurity fundamentals course focusing on network defense, threat identification, and cloud security awareness.

Skills: Firewall Configuration · Threat Management · Cloud Security · Network Defense
06
COMMENDATIONS
2024
Hackathon · Finalist
Hackathon Finalist — Top 10
Idea Hackathon · Phishers Project
2024
Hackathon · Prize Winner
Consolation Prize — Top 10
CCTV Surveillance Security & Forensics Hackathon 2.0 · Harden the Grid Project
§
2024
Published
Book Contributor — Intelligent Forensic
Contributed to research, content development, and technical writing for a published book on digital forensics. Participated in the editorial and review process, including proofreading, fact-checking, and content structuring.
Leadership · Cyber Council
Events Lead — Cyber Council, SAKEC
  • Led and organized multiple cybersecurity awareness sessions and competitions.
  • Coordinated with industry experts to host guest lectures and technical workshops.
  • Managed event logistics, marketing, and student engagement initiatives.
Leadership · EBSB Club
Events Head — Ek Bharat Shreshtha Bharat Club, SAKEC
  • Headed the Events Team for cultural and technical exchange programs.
  • Organized inter-college competitions promoting collaboration and national integration.
Community · GDSC
Operational Team Member — Google Developer Student Clubs
  • Contributed to planning and execution of technical workshops and community initiatives.
  • Assisted in speaker coordination, event logistics, and student engagement.
Technical · Cyber Council
Technical Team Member — Cyber Council, SAKEC
  • Supported cybersecurity workshops, awareness sessions, and technical competitions.
  • Assisted in preparing technical content and coordinating event execution.
CTF Participation
CTF Competitor
Participated in multiple cybersecurity Capture The Flag competitions, specializing in Web Exploitation, OSINT, and Digital Forensics. Solved challenges across Web Exploitation, OSINT, Digital Forensics, Steganography, Reverse Engineering, and Misc categories involving vulnerability analysis, traffic inspection, and logic-based exploitation.
07
MAKE CONTACT

Open to red teaming, application security, and threat analysis roles. Always glad to connect with researchers, security teams, and fellow curious minds.

purva.17737@sakec.ac.in LinkedIn GitHub >_ Terminal Portfolio Download Resume