JT
JT
JT

Who Am I?
> ./about.sh
I'm a Cybersecurity Professional and Network Engineer with a passion for securing digital infrastructure and identifying vulnerabilities before they become threats.
With a Master's in Cybersecurity from Monash University and hands-on experience in penetration testing, vulnerability assessments, and network security, I bring both academic rigor and practical expertise to every project.
My toolkit includes Nmap, Burp Suite, Wireshark, Metasploit, and cloud platforms like AWS. I hold certifications including CCNP, CCNA, and AWS Solutions Architect.
Tech Arsenal
Networking
- > Cisco Routers & Switches
- > VLANs & VPNs
- > BGP & OSPF
- > Firewalls & IDS/IPS
- > TCP/IP & DNS
Security
- > Penetration Testing
- > Vulnerability Assessment
- > Nmap & Burp Suite
- > Wireshark & Metasploit
- > OWASP Top 10
Advanced Security
- > Social Engineering
- > Zero Trust Architecture
- > Endpoint Security
- > Identity & Access Management
- > Malware Analysis
Cloud
- > AWS EC2 & S3
- > AWS VPC & IAM
- > Cloud Security
- > Infrastructure as Code
- > Docker
Development
- > Python
- > Java
- > Linux & Shell Scripting
- > SQL
- > Git
// proficiency_levels
// tools_i_use
Journey
Master of Information Technology
Monash University, Melbourne (Cybersecurity Major)
Network Security, Penetration Testing, Security Assessment, Cloud Security, Secure Software Development.
Network Engineer
Soften Technologies, India
Installed and maintained network hardware including switches, routers, and firewalls. Monitored performance and ensured network security through access control and firewall configuration.
Intern
Bensoft Systems (P) Ltd, Kerala
Completed internship focusing on computer systems and technology. Gained hands-on experience with IT infrastructure and software systems.
Bachelor of Technology
Karunya Institute of Technology, Coimbatore
Computer Science & Engineering. Courses in Data Structures, Algorithms, Database Management, Computer Networks, and Mobile App Development.
Credentials
Security Projects
Projects
Vulnerabilities Found
Tools Used
// All project reports available in PDF format
> cat /var/log/security_research.log
Security Research
Real-world security assessments, penetration tests, and exploitation research. Click any card to view evidence screenshots.

SkillsBridge Vulnerability Assessment
Comprehensive security assessment of a web application identifying critical vulnerabilities including SQL injection points, authentication weaknesses, and server misconfigurations.

Binary Exploitation & Memory Attacks
Deep dive into buffer overflow exploitation techniques including ASLR bypass, Stack Guard bypass, and format string attacks on vulnerable binaries.

Penetration Test: Deathnote VM
Full penetration test engagement on a vulnerable machine, from initial reconnaissance to root access, including threat modeling and DFD analysis.

OWASP Web Security Labs
Hands-on completion of PortSwigger Web Security Academy labs covering SQL injection, XSS, CSRF, and other OWASP Top 10 vulnerabilities.

Enterprise Network Security Design
Design and implementation of a secure enterprise network with VPN tunnels, firewall policies, and intrusion detection systems.

Security Risk Assessment & CVSS Analysis
Comprehensive risk assessment using CVSS scoring methodology to quantify and prioritize security vulnerabilities with mitigation strategies.
> ./live_demo.sh
Live Terminal Demo
Watch real security techniques in action. Select a scenario and see how penetration testing works.
Click "Run Demo" to start the simulation
This is a simulated demo for educational purposes
* This is a simulated demonstration for educational purposes only. All techniques shown are performed in authorized environments.
Global Cyber Threat Map
ATTACKS DETECTED
0
THREATS BLOCKED
0
ACTIVE THREATS
0
* Simulated threat data for demonstration purposes
Interactive Encryption
Explore different encryption algorithms in real-time
* For demonstration purposes. Use proper cryptographic libraries for real security.
Packet Visualizer
PACKETS SENT
0
DELIVERED
0
BLOCKED
0
DROPPED
0
Hide Messages in Images
Steganography is the art of hiding secret information within ordinary data. This tool uses LSB (Least Significant Bit) encoding to hide messages in images.
SQL Injection Playground
Learn how SQL injection attacks work in a safe, simulated environment. This is for educational purposes only - never test on systems without permission!
EDUCATIONAL PURPOSE ONLY: This is a simulation. SQL injection is illegal when performed on systems without authorization.
// how_to_prevent_sql_injection
- Use parameterized queries (prepared statements)
- Implement input validation and sanitization
- Use ORMs (Object-Relational Mapping)
- Apply least privilege database permissions
- Enable WAF (Web Application Firewall)
Get In Touch
I'm currently looking for opportunities in cybersecurity and network engineering roles in Australia. Whether you have a question or just want to say hi, feel free to reach out!
jeffint69@gmail.com
Phone
+61 432 009 364
Connect on LinkedIn
Location
Melbourne, Australia
ยฉ 2026 Jeffin Thomas Valliyakalayil
</> with โค in Melbourne
// secret: โโโโโโโโBA