JT

JT

JT

[INITIALIZING...]
0%
0%
Press Ctrl+K for commands
jeffin@portfolio:~
$ โ–‹
Jeffin Thomas Valliyakalayil
Available for hire
// about_me

Who Am I?

> ./about.sh

I'm a Cybersecurity Professional and Network Engineer with a passion for securing digital infrastructure and identifying vulnerabilities before they become threats.

With a Master's in Cybersecurity from Monash University and hands-on experience in penetration testing, vulnerability assessments, and network security, I bring both academic rigor and practical expertise to every project.

My toolkit includes Nmap, Burp Suite, Wireshark, Metasploit, and cloud platforms like AWS. I hold certifications including CCNP, CCNA, and AWS Solutions Architect.

0+Certifications
0+Years Experience
0+Security Projects
MScCybersecurity
// skills

Tech Arsenal

๐ŸŒ

Networking

  • > Cisco Routers & Switches
  • > VLANs & VPNs
  • > BGP & OSPF
  • > Firewalls & IDS/IPS
  • > TCP/IP & DNS
๐Ÿ”

Security

  • > Penetration Testing
  • > Vulnerability Assessment
  • > Nmap & Burp Suite
  • > Wireshark & Metasploit
  • > OWASP Top 10
๐Ÿ›ก๏ธ

Advanced Security

  • > Social Engineering
  • > Zero Trust Architecture
  • > Endpoint Security
  • > Identity & Access Management
  • > Malware Analysis
โ˜๏ธ

Cloud

  • > AWS EC2 & S3
  • > AWS VPC & IAM
  • > Cloud Security
  • > Infrastructure as Code
  • > Docker
๐Ÿ’ป

Development

  • > Python
  • > Java
  • > Linux & Shell Scripting
  • > SQL
  • > Git

// proficiency_levels

Network Security0%
Penetration Testing0%
Cloud Security (AWS)0%
Vulnerability Assessment0%
Zero Trust Architecture0%
Python0%
Linux Administration0%
Cisco Networking0%
Malware Analysis0%
Identity & Access Mgmt0%

// tools_i_use

NmapBurp SuiteWiresharkMetasploitNiktoNessusAWSCisco Packet TracerGNS3Kali LinuxDockerGit
// experience

Journey

Feb 2024 - Dec 2025

Master of Information Technology

Monash University, Melbourne (Cybersecurity Major)

Network Security, Penetration Testing, Security Assessment, Cloud Security, Secure Software Development.

Jul 2023 - Dec 2023

Network Engineer

Soften Technologies, India

Installed and maintained network hardware including switches, routers, and firewalls. Monitored performance and ensured network security through access control and firewall configuration.

Jun 2022 - Jul 2022

Intern

Bensoft Systems (P) Ltd, Kerala

Completed internship focusing on computer systems and technology. Gained hands-on experience with IT infrastructure and software systems.

Jun 2019 - May 2023

Bachelor of Technology

Karunya Institute of Technology, Coimbatore

Computer Science & Engineering. Courses in Data Structures, Algorithms, Database Management, Computer Networks, and Mobile App Development.

// certifications

Credentials

๐Ÿ†

CCNP

Cisco Certified Network Professional

Advanced enterprise networking skills including routing, switching, security, and troubleshooting complex networks.

Cisco
๐Ÿ†

CCNA

Cisco Certified Network Associate

Foundational networking knowledge covering IP connectivity, network access, security fundamentals, and automation.

Cisco
โ˜๏ธ

AWS Solutions Architect

Associate Level Certification

Designing distributed systems on AWS including compute, storage, networking, and security best practices.

Amazon Web Services
๐Ÿง

RHCE

Red Hat Certified Engineer

Linux system administration, automation with Ansible, and managing enterprise infrastructure at scale.

Red Hat
๐Ÿ”

Cyber Security Training

Professional Security Training Program

Comprehensive training in threat detection, incident response, vulnerability assessment, and security operations.

UST Global
๐ŸŽ“

Master of Cybersecurity

Graduated December 2025

Advanced studies in network security, penetration testing, secure software development, and cloud security.

Monash University
โ›“๏ธ

Blockchain: LFS170x

Understanding Blockchain Uses & Implications

Distributed ledger technology, smart contracts, cryptocurrency fundamentals, and enterprise blockchain applications.

Linux Foundation
// security_projects

Security Projects

8

Projects

10

Vulnerabilities Found

35

Tools Used

๐Ÿ’€
Solo Project2024

Penetration Testing - Deathnote VM

Full Stack Exploitation & Privilege Escalation

FIT5003 - Software Security

Conducted comprehensive penetration testing on Deathnote vulnerable machine, identifying critical vulnerabilities and demonstrating full exploitation chain from initial access to root privilege escalation.

// vulnerabilities_found

Authentication Bypass7.5
Remote Code Execution9.8
Privilege Escalation8.2

// tools_used

NmapHydraNetcatLinPEASBurp SuitePython
๐Ÿงจ
Solo Project2024

Buffer Overflow Exploitation

Memory Corruption & Security Bypass Techniques

FIT5003 - Software Security

Deep-dive into low-level memory exploitation techniques including stack-based buffer overflows, bypassing modern security protections (ASLR, Stack Guard, DEP), and format string vulnerabilities.

// tools_used

GDBPerlPythonLinuxobjdumpstrace
๐ŸŒ
Solo Project2024

Web Security Labs

OWASP Top 10 Exploitation

FIT5003 - Software Security

Completed advanced PortSwigger Web Security Academy labs demonstrating proficiency in SQL Injection, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF) attack techniques.

// vulnerabilities_found

SQL Injection (UNION)8.6
DOM-based XSS6.1
CSRF Token Bypass8.0

// tools_used

Burp SuitePortSwigger LabsBrowser DevToolsSQLMap
๐Ÿข
Solo Project2024

Enterprise Network Security Design

Multi-Campus VPN, Firewall & IDS Architecture

FIT5037 - Network Security

Designed and implemented comprehensive network security architecture for multi-campus university network including Site-to-Site VPN, Remote Access VPN, firewall rules, and intrusion detection systems.

// tools_used

GNS3MikroTik RouterOSSnort IDSstrongSwanWiresharkIPsec
๐Ÿ”
Team Project2024

SkillsBridge Vulnerability Assessment

Web Application Security Testing & Risk Analysis

Team Project - Stranger Thinks

Conducted comprehensive security assessment of SkillsBridge web application using multiple scanning tools, identifying security vulnerabilities and providing detailed risk analysis with mitigation strategies.

// vulnerabilities_found

Missing HSTS Header6.5
Missing X-Frame-Options6.5
Private IP Disclosure5.3
DoS Risk - Slow HTTP5.0

// tools_used

Nmap 7.95NiktoBurp SuiteSSL LabsOWASP ZAP
๐Ÿ“Š
Team Project2024

Security Risk Analysis Report

Risk Assessment & Mitigation Strategies

Team Project - Stranger Thinks

Comprehensive risk analysis report consolidating findings from Nmap, Nikto, and Burp Suite scans with detailed risk tables, severity ratings, and actionable mitigation strategies.

// tools_used

Risk MatrixCVSS CalculatorOWASP Guidelines
๐ŸŽ“
Research2024-2025

Senior Lifelong Learning Platform

Graduate Research Project

Monash University

Developed a web platform for older Australians (60+) with digital literacy guides and health resources. Conducted comprehensive security assessment addressing OWASP Top 10 vulnerabilities.

// tools_used

OWASP ZAPNiktoNmapReactNode.jsPostgreSQL
๐Ÿ“
Research2022-2023

Indoor Positioning System

BLE-Based Navigation Research

Karunya Institute of Technology

Built Android application using BLE beacons for GPS-denied environments. Implemented advanced algorithms for accurate indoor positioning and navigation. Co-authored IEEE research paper.

// tools_used

Android StudioJavaBLE BeaconsSQLiteGit

> cat /var/log/security_research.log

Security Research

Real-world security assessments, penetration tests, and exploitation research. Click any card to view evidence screenshots.

SkillsBridge Vulnerability Assessment
[4 Screenshots]
Click to view evidence
Vulnerability Assessment

SkillsBridge Vulnerability Assessment

Comprehensive security assessment of a web application identifying critical vulnerabilities including SQL injection points, authentication weaknesses, and server misconfigurations.

NmapNiktoBurp SuiteKali Linux
Binary Exploitation & Memory Attacks
[5 Screenshots]
Click to view evidence
Binary Exploitation

Binary Exploitation & Memory Attacks

Deep dive into buffer overflow exploitation techniques including ASLR bypass, Stack Guard bypass, and format string attacks on vulnerable binaries.

GDBPythonpwntoolsROPgadget
Penetration Test: Deathnote VM
[5 Screenshots]
Click to view evidence
Penetration Testing

Penetration Test: Deathnote VM

Full penetration test engagement on a vulnerable machine, from initial reconnaissance to root access, including threat modeling and DFD analysis.

NmapMetasploitHydraLinPEAS
OWASP Web Security Labs
[4 Screenshots]
Click to view evidence
Web Application Security

OWASP Web Security Labs

Hands-on completion of PortSwigger Web Security Academy labs covering SQL injection, XSS, CSRF, and other OWASP Top 10 vulnerabilities.

Burp SuiteBrowser DevToolsSQLMap
Enterprise Network Security Design
[5 Screenshots]
Click to view evidence
Network Security

Enterprise Network Security Design

Design and implementation of a secure enterprise network with VPN tunnels, firewall policies, and intrusion detection systems.

MikroTikSnort IDSGNS3Wireshark
Security Risk Assessment & CVSS Analysis
[3 Screenshots]
Click to view evidence
Risk Management

Security Risk Assessment & CVSS Analysis

Comprehensive risk assessment using CVSS scoring methodology to quantify and prioritize security vulnerabilities with mitigation strategies.

CVSS CalculatorRisk MatrixExcelNIST Framework
6+
SECURITY_REPORTS
20+
VULNS_DISCOVERED
15+
TOOLS_MASTERED
9.8
MAX_CVSS_FOUND

> ./live_demo.sh

Live Terminal Demo

Watch real security techniques in action. Select a scenario and see how penetration testing works.

Speed:
kali@security:~/full-attack-chain

Click "Run Demo" to start the simulation

This is a simulated demo for educational purposes

Ready

* This is a simulated demonstration for educational purposes only. All techniques shown are performed in authorized environments.

// live_threat_intelligence

Global Cyber Threat Map

ATTACKS DETECTED

0

THREATS BLOCKED

0

ACTIVE THREATS

0

LIVE
Recent Threat Activity
No active threats detected...
DDoS Attack
Ransomware
Phishing
SQL Injection
Brute Force
Zero-Day Exploit

* Simulated threat data for demonstration purposes

// encryption_playground

Interactive Encryption

Explore different encryption algorithms in real-time

Shifts each letter by a fixed number of positions

Shift:3
Output will appear here...
Input Length

13

Output Length

0

Algorithm

Caesar Cipher

* For demonstration purposes. Use proper cryptographic libraries for real security.

// network_traffic_analysis

Packet Visualizer

PACKETS SENT

0

DELIVERED

0

BLOCKED

0

DROPPED

0

Firewall Rules:
๐Ÿ’ป

Client

๐Ÿ›ก๏ธ

Firewall

๐Ÿ“ถ

Router

๐Ÿ–ฅ๏ธ

Server

LIVE
Packet Log
๐Ÿ“ฆ
TCP
โšก
UDP
๐ŸŒ
HTTP
๐Ÿ”’
HTTPS
๐Ÿ“
DNS
๐Ÿ“ก
ICMP
// steganography_tool

Hide Messages in Images

Steganography is the art of hiding secret information within ordinary data. This tool uses LSB (Least Significant Bit) encoding to hide messages in images.

0 characters0 bits required

// how_lsb_steganography_works

1.

Each pixel has RGB values (0-255). In binary, the last bit is "least significant"

2.

We convert the message to binary and replace LSBs with message bits

3.

Changing only the LSB alters colors by at most 1 unit - invisible to human eyes

4.

To decode, we extract all LSBs and convert back to text

// sql_injection_lab

SQL Injection Playground

Learn how SQL injection attacks work in a safe, simulated environment. This is for educational purposes only - never test on systems without permission!

โš 

EDUCATIONAL PURPOSE ONLY: This is a simulation. SQL injection is illegal when performed on systems without authorization.

// simulated_login_form

Hint: Try "guest" / "guest" for normal login

Generated SQL Query
SELECT * FROM users WHERE username='...' AND password='...'

// how_to_prevent_sql_injection

  • Use parameterized queries (prepared statements)
  • Implement input validation and sanitization
  • Use ORMs (Object-Relational Mapping)
  • Apply least privilege database permissions
  • Enable WAF (Web Application Firewall)
// contact

Get In Touch

$ ./initiate_contact.sh

I'm currently looking for opportunities in cybersecurity and network engineering roles in Australia. Whether you have a question or just want to say hi, feel free to reach out!

// Looking forward to connecting with you!

ยฉ 2026 Jeffin Thomas Valliyakalayil

</> with โค in Melbourne

// secret: โ†‘โ†‘โ†“โ†“โ†โ†’โ†โ†’BA