CYBER SECURITY SPECIALIST
0
INITIALIZING...
AVAILABLE FOR OPPORTUNITIES OPEN
SOUMYAJIT
DUTTA
role::

Crafting impenetrable digital defenses through vulnerability assessment, network forensics & secure application development. Based in Kolkata, India. Active GitHub contributor with real-world security tools.

0
PROJECTS BUILT
0
CERTIFICATIONS
0
LANGUAGES
0
INTERNSHIP
› VAPT ANALYST
★ CERTIFIED
› PYTHON / BASH
⚡ KALI LINUX
01
01
TECHNICAL ARSENAL

Skills & Expertise

A comprehensive toolkit built through hands-on projects, coursework, and real-world security challenges.

LANGUAGES05 SKILLS
PythonCC++BashSQL
PLATFORMS & TOOLS04 TOOLS
Kali LinuxUbuntuWiresharkGit
SECURITY DOMAINS04 AREAS
VAPTNetworkingThreat AnalysisCryptography
OTHER03 SKILLS
AI FundamentalsRobotics DevEthical Hacking
PYTHON / SCRIPTING90
NETWORK ANALYSIS85
VULNERABILITY ASSESSMENT80
LINUX ADMINISTRATION82
CRYPTOGRAPHY70
WEB SECURITY78
02
02
PORTFOLIO

Security Projects

Real tools built to detect, analyze, and prevent cyber threats across different attack surfaces.

01
// 01
🛡️
Network Vulnerability Scanner

Automated port scanning and service enumeration with vulnerability fingerprinting, risk-level classification and export reports.

PythonNmapSocket
02
// 02
🕷️
Website Vulnerability Scanner

Detects SQLi, XSS, CSRF, and OWASP Top 10 vulnerabilities through automated payload injection and response analysis.

PythonRequestsBS4
03
// 03
📡
Network Packet Analyzer

Real-time packet capture with deep protocol inspection, traffic statistics, and anomaly detection for network forensics.

ScapyWiresharkPython
04
// 04
⌨️
Keylogger (Educational)

Demonstrates system-level keystroke monitoring for security awareness. Highlights unprotected endpoint attack surfaces.

PythonpynputOS
05
// 05
🔐
Password Strength Checker

Shannon entropy analysis with dictionary attack simulation and pattern recognition to evaluate password resilience.

PythonEntropyRegex
06
// 06
🖼️
Image Encryption Tool

Pixel-manipulation-based image encryption using XOR operations and steganographic techniques for visual data security.

PythonPILNumPy
07
// 07
🔑
Caesar Cipher Tool

Full encryption/decryption suite with brute-force cracking, frequency analysis, and cipher strength evaluation tools.

PythonCryptoCLI
03
03
CAREER

Work Experience

PRODIGY INFOTECH

Cyber Security Intern

JUL 2025 — PRESENT

  • Conducted comprehensive vulnerability assessments and penetration testing on simulated enterprise environments with detailed security reports.
  • Executed real-world cybersecurity scenarios replicating production attack surfaces including web apps, networks, and system configurations.
  • Developed security findings documentation with actionable remediation recommendations aligned to industry best practices.
04
04
BACKGROUND

Education & Certifications

01UNDERGRADUATE
B.Sc in Cyber Security
Guru Nanak Institute of Technology
📍 Kolkata, West Bengal
02HIGHER SECONDARY
Higher Secondary (HS)
Bholananda National Vidyalaya
📍 West Bengal, India
🔵
Cyber Job Simulation
DELOITTE AUSTRALIA
🛡️
Critical Infrastructure Protection
OPSWAT ACADEMY
🔶
Cybersecurity Analyst Simulation
TATA GROUP
💳
Cybersecurity Simulation
MASTERCARD
05
05
GET IN TOUCH
Let's Build
Something Secure

Open to internships, collaborations, and security research. Always excited to tackle new challenges in the cyber domain.

whoami.sh