Security. Innovation. Resilience.

Securing the Digital Frontierwith Precision

I'm Yeshu Wanjari, driven by a lifelong passion for technology and cybersecurity. With proven skills in tackling complex security challenges, building innovative projects, and delivering secure, scalable software solutions.

Lock topLock Main

Encryption is just the beginning of the story.

Ensuring Confidentiality, Integrity & Availability

Your data deserves fortress-level protection.
Every click matters; so does every line of code.

Security & Pentesting

Penetration TestingVulnerability AssessmentNetwork SecurityEthical HackingForensicsSIEMIncident ResponseThreat Hunting

Tools & Frameworks

Burp SuiteNmapWiresharkMetasploitSplunkKali LinuxNISTISO 27001

Development

PythonJavaScriptReactNode.jsMongoDBSQLBashC/C++

Platforms & Cloud

AWSLinuxWindowsmacOSDockerGitVS CodePostman

Career

Professional Experience

Roles focused on cyber defense, forensic investigation, and secure web development.

Cyber Security Associate

Alliantgroup

Full-timeDec 2025 - Present
  • Conducted proactive threat hunting using SIEM queries and behavioral analysis
  • Mapped observed attacker activity to MITRE ATT&CK tactics, techniques, and procedures Client Handling & Escalations
  • Acted as primary contact for multiple clients during security incidents and escalations.
  • Communicated technical findings in business-friendly language to clients, management, and non-technical stakeholders.
  • Handled client escalations, providing timely updates, mitigation guidance, and closure confirmation.
  • Prepared and delivered incident summary reports, and monthly SOC reports
  • Assisted with vulnerability scan reviews, false-positive validation, and risk prioritization.
  • Monitored, triaged and escalated countless security alerts across SIEM platforms (EDR, firewall, IDS/IPS, cloud, and application logs), maintaining SLA-driven response times.
  • Investigated security events such as phishing, malware, brute-force attacks, privilege misuse, lateral movement, and data exfiltration attempts.
  • Reduced alert noise by 50–60% through tuning rules, suppressions, and threshold optimization.
Hyderabad, India

Cyber Security Engineer

COE Security LLC

Full-timeMay 2025 - Nov 2025
  • Performed end-to-end VAPT in alignment with OWASP Top 10, discovering high-risk vulnerabilities including Broken Access Control, IDOR, XSS, SQLi, and CSRF, reducing risk exposure by 60%.
  • Created detailed vulnerability reports with remediation strategies, improving patch turnaround time by 40%.
  • Developed Python scripts for automating tasks, reducing investigation time by over 75%.
Remote

Cyber Security Trainee

DRDO, Ministry of Defence, Gov of India

TraineeMay 2025 - Jul 2025
  • Conducted in-depth cybersecurity research to support national security initiatives, focusing on cyber threat defense strategies for critical infrastructure.
  • Contributed to 5+ internal security reports and policy briefs for senior leadership.
  • Conducted threat intelligence analysis and reported potential indicators of compromise using OSINT and MITRE ATT&CK frameworks.
  • Executed 10+ phishing simulations using Social Engineering Toolkit (SET).
New Delhi, India

Cyber Forensic Intern

Cyber Security Corp, Pune

Jun 2023 - Jan 2024
  • Investigated and resolved 20+ cybersecurity cases and incidents in collaboration with law enforcement, improving case resolution time by 25%.
  • Identified a critical vulnerability in Microsoft's Bitlocker Encryption.
  • Developed expertise in Mobile forensics, Linux, Splunk, Autopsy, Wireshark, Nmap, Metasploit, Burp Suite, Hashing, Encryption, Python automation, and Maltego.
Pune, India

Portfolio

Projects

A focused set of security and engineering projects with practical outcomes and measurable impact.

Visit App

DarkGPT

Built a SaaS AI Chatbot from scratch using MERN stack and LLMs that provides detailed, unfiltered insights to assist ethical hackers in penetration testing strategies, identifying security vulnerabilities, and understanding exploitation techniques. Tech: ReactJS, ExpressJS, NodeJS, MongoDB, LLMs.

ThreatX

An AI-powered threat intelligence platform that helps SOC teams identify and mitigate security threats. Combines top platforms like VirusTotal, URLhaus, and AbuseIPDB to provide comprehensive threat intelligence with integrated AI analysis.

File Exterminator

A Python-based CLI tool implementing U.S. DoD algorithms to securely erase sensitive data. The tool has been used to erase over 50 GB+ of sensitive data, making it irrecoverable by forensic and data recovery tools. Tech: Python, Data Security, Kali Linux CLI.

Eye-Controlled Mouse

Developed a hands-free cursor control system using webcam eye tracking with blink-based click simulation, enhancing accessibility for users with physical disabilities.

Academic

Education

A rigorous academic foundation in cyber security and computer science with strong performance and applied learning.

M.Tech - Cyber Security

M.Tech - Cyber Security

2024 - 2026

Amity University

8.8 CGPANoida, UP, India
B.Tech - Computer Science and Engineering

B.Tech - Computer Science and Engineering

2020 - 2024

Symbiosis Skills and Professional University

8.5 CGPAPune, MH, India

Credentials

Certifications

Industry-recognized credentials focused on security operations, cloud fundamentals, and offensive techniques.

Microsoft logo

Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC-900)

Microsoft

Issued Jun 2025

View credential
Palo Alto Networks logo

Security Operations Fundamentals: Practitioner

Palo Alto Networks

Issued Apr 2024

View credential
Qualys logo

Qualys Certified Specialist - Vulnerability Management Detection & Response

Qualys

Issued Apr 2024

View credential
CompTIA logo

CompTIA Security+

CompTIA

Issued Mar 2025

View credential
Google logo

Certified CyberSecurity Professional

Google

Issued Feb 2025

View credential