00%
Cybersecurity Professional

Hi, I'm Jai Padhiar
|

Building robust security tools and enterprise solutions that protect organizations from evolving cyber threats. Specializing in compliance automation, threat detection, and secure infrastructure design.

0 Projects Built
0 Security Tools
0 Technologies
jai@kali:~
$ whoami
cybersecurity_engineer
$ cat skills.txt
Penetration Testing | VAPT | Cloud Security
Compliance Automation | Threat Hunting
Python | PowerShell | Docker | AWS
$ nmap -sV portfolio.jai
9 services detected | All secure ✓
$
Scroll Down

Security-First Engineer

Passionate about building tools that make the digital world safer

Offensive Security

Expert in vulnerability assessment and penetration testing (VAPT). I build tools that identify and exploit vulnerabilities before attackers do, ranging from web app security to deep & dark web reconnaissance.

Defensive Security

Designing compliance scanners, log analysis engines with ML-powered threat detection (99%+ accuracy), and CIS benchmarking tools that continuously audit and harden systems against attack surfaces.

Full-Stack Development

From Python backends to React.js frontends, Docker containers to AWS infrastructure; I architect end-to-end solutions including interactive cybersecurity labs, monitoring dashboards, and automated backup systems.

Security Training

Building educational tools like ransomware awareness simulators and hands-on cybersecurity labs that train the next generation of security professionals in safe, containerized environments.

Professional Journey

Dec 2024 - Present

Cloud Security Engineer

Operisoft Pvt. Ltd.

Building end-to-end pitch-ready products and securing customer infrastructure with advanced Crowdstrike firewall policies. Conducting full-scale VAPT and contributing to DevOps, GenAI, and Solution Architecture departments.

VAPT Crowdstrike Firewall GenAI DevOps Solution Architecture
Professional Freelance

Ethical Hacker & Pentester

Freelancing (7+ Years)

Specialized in academic and professional security projects. Completed over 22+ projects ranging from exploit development to full infrastructure audits.

9 Academic Projects 13 Client Projects Exploit Research
July 2021 - May 2022

Penetration Tester (Apprentice)

Cyber Octet Pvt. Ltd.

Enhanced web security for major platforms like Lok Patrika and AllEvents using Nmap, Wireshark, Metasploit, and Nessus.

Metasploit Nessus Nmap Wireshark

Certification Vault

Verified professional expertise from industry-leading organizations.

2025

Certified in Cybersecurity (CC)

(ISC)² International

2025

Certified Zero Trust Cyber Associate

Zscaler (ZTCA)

2025

Cloud Security Advanced

Trend Micro

2025

VMDR Specialist

Qualys

2025

Network Security Advanced

Trend Micro

2025

Security Operations Advanced

Trend Micro

2024

Network Defence Essentials

EC-Council

2023

NASA Hackathon (3rd Place)

Space Apps Challenge

Educational Journey

Foundation of my technical expertise and problem-solving skills

Master of Computer Applications

Nirma University | 2023 - 2025

8.5 CGPA
Advanced Cryptography Cloud Security Operations Network Defense & Countermeasures Ethical Hacking Blockchain Security

Bachelor of Computer Applications

Kadi Sarva Vishvavidhyalaya | 2020 - 2023

8.4 CGPA
Database Security Operating System Security Web Development Core Java & Python Software Engineering

Strategic Offerings

Ethical Hacking

Tailored security assessments focused on discovering complex vulnerabilities and logic flaws.

Pentesting

Deep-dive security testing for web, mobile, and network infrastructure to ensure hardened defense.

Technical Speaking

Industry-focused seminars and workshops on cybersecurity trends, hacking, and defense strategies.

XaaS Architecture

Custom security tool development and automation projects built from the ground up.

Featured Projects

A collection of security tools and enterprise solutions I've built

#01

Compliance Scanner

A comprehensive enterprise-grade compliance scanner that performs deep audits on Windows machines to assess compliance readiness against industry standards (CIS, NIST, ISO 27001). Automates security checks across password policies, firewall rules, user access controls, registry settings, and service configurations; generating detailed PDF reports with risk scores and remediation steps.

Python Security Compliance
Automated CIS/NIST audits
PDF report generation
Risk scoring engine
Schedule Demo
#02

Log Analysis Tool

AI-powered log analysis engine leveraging machine learning models to detect malicious activity with 99%+ accuracy. Ingests server logs in real-time to identify SQL injection attempts, DDoS attack patterns, path traversal exploits, XSS payloads, and brute-force login attacks. Features anomaly detection, behavioral analysis, and automated alert correlation for SOC teams.

Python Machine Learning Security
99%+ detection accuracy
Real-time threat detection
ML anomaly detection
Schedule Demo
#03

Deep & Dark Web Monitoring

Advanced OSINT reconnaissance tool that scans email addresses and domains against leaked databases from historical data breaches across the deep and dark web. Aggregates intelligence from paste sites, breach databases, and underground forums, generating comprehensive exposure reports detailing compromised credentials, leaked PII, and breach timeline analysis.

Python OSINT Data Breach
Multi-source intelligence
Breach timeline analysis
Exposure risk scoring
Schedule Demo
#04

Backup Tool

Cross-platform disaster recovery solution with intelligent backup agents for Windows and Linux servers. Performs incremental and full system backups — capturing OS state, configurations, databases, and application data — with seamless restoration to any cloud platform (AWS, Azure, GCP). Features automated scheduling, encryption at rest, and S3-compatible storage integration.

Python Cloud DevOps
Cross-platform support
Cloud restoration (AWS/Azure)
Encrypted backups
Schedule Demo
#05

Android CIS Benchmarking

Native Android application that performs automated security posture assessments against CIS (Center for Internet Security) benchmarks. Evaluates device encryption, screen lock policies, developer options, USB debugging, app permissions, and network configurations — producing a detailed compliance scorecard with actionable hardening recommendations.

Android Security CIS Benchmark
CIS benchmark compliance
Compliance scorecard
Hardening recommendations
Schedule Demo
#06

Cybersecurity Lab

Full-stack interactive cybersecurity training platform with a browser-based Kali Linux terminal. Students practice real-world penetration testing — running Nmap scans, Metasploit exploits, and web app attacks against intentionally vulnerable targets (OWASP Juice Shop). Built with React.js frontend, Docker containerization, and automated lab provisioning via Terraform on AWS.

Docker React.js TypeScript Kali Linux
Browser-based Kali terminal
Auto-provisioned labs
Real-world attack scenarios
Schedule Demo
#07

Ransomware Awareness Tool

Educational ransomware simulation platform designed for corporate security awareness training. Safely demonstrates ransomware behavior — file encryption mechanics, ransom note delivery, and lateral movement patterns — without causing actual damage. Helps organizations train employees to recognize social engineering tactics and implement prevention strategies in a controlled sandbox.

PowerShell Security Training Awareness
Safe sandbox simulation
Corporate training modules
Attack pattern education
Schedule Demo
#08

URL Tracker

Enterprise-grade employee monitoring solution with a lightweight agent deployed across workstations. Tracks browsing activity — recording URLs, browser types, timestamps, and session durations — feeding data to a centralized admin dashboard. Provides management with comprehensive visibility into web usage patterns, policy violations, and productivity analytics with exportable reports.

Monitoring Admin Panel Security
Agent-based monitoring
Admin dashboard
Policy compliance tracking
Schedule Demo
#09

CPU Utilization Checker

Automated server health monitoring agent that continuously tracks CPU and memory utilization across infrastructure. Triggers intelligent real-time alerts when resource thresholds are exceeded — including the top 5 processes consuming CPU and memory. Supports email/SMS notifications, historical trend analysis, and integrates with existing monitoring stacks for proactive incident response.

Monitoring Performance Alerts
Real-time resource alerts
Top process identification
Trend analysis & reporting
Schedule Demo

Skills & Technologies

Tools and technologies I use to build secure, scalable solutions

Languages

Python
PowerShell
JavaScript
TypeScript
Bash

Security

VAPT
Compliance
OSINT
Threat Hunting
SIEM

Cloud & DevOps

AWS
Docker
Terraform
Linux
Git

Frameworks

React.js
Node.js
Flask
Android
ML / AI

Let's Connect

Interested in a demo or collaboration? Let's talk.