Skip to content
View naveenkarasu's full-sized avatar

Block or report naveenkarasu

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
naveenkarasu/README.md

Hi π™Όπš’ πš—πšŠπš–πšŽ πš’πšœ π™½πšŠπšŸπšŽπšŽπš— π™°πš“πšŠπš’ π™ΊπšŠπš›πšŠπšœπšž Hacking GIF

πŸ’« About Me:

πŸ”­ I’m currently working on

I am currently looking for a role in Cybersecurity. Before that I worked has cybersecurity Engineer at the University of North Texas, where I assist students in cybersecurity labs, mentor them for industry certifications and develop hands-on exercises covering network security, cryptography, DevOps security and risk assessment. Additionally, I’m engaged in AI security research, focusing on ensuring compliance with security frameworks such as ISO 27001, NIST, and HIPAA.

πŸ‘― I’m looking to collaborate on

I’m eager to collaborate on offensive security research, penetration testing, security automation, and cloud security projects. I enjoy working on threat modeling, SIEM optimization, and improving security frameworks for AI systems.

🀝 I’m looking for help with

I’m interested in deepening my knowledge of advanced adversarial security techniques, red teaming strategies, and zero-trust architecture implementations. If you’re an expert in these areas, I’d love to exchange insights and learn from your experience!

🌱 I’m currently learning

I’m currently advancing my expertise in Security Orchestration, Automation and Response (SOAR) and threat intelligence platforms. I’m also working toward earning my Certified Information Systems Security Professional (CISSP) certification.

πŸ’¬ Ask me about

Penetration testing & vulnerability management (Metasploit, Burp Suite, Cobalt Strike, BloodHound)
Security compliance frameworks (ISO 27001, NIST 800-53, SOC2, FedRAMP, MITRE ATT&CK)
Secure software development (Threat modeling, secure coding practices, DevSecOps)
Cloud and network security (AWS/Azure security, firewall configurations, network anomaly detection)
SIEM & Incident Response (Splunk, Microsoft Sentinel, QRadar, EDR solutions)

⚑ Fun fact

I once secured second place in the CanSec24 CTF challenge, where my team worked through forensics, reverse engineering, and web exploitation scenarios. I also enjoy breaking into Capture The Flag (CTF) competitions, testing my ethical hacking skills, and learning new attack vectors in my free time!

πŸ’» Tech Stack:

C C# C++ HTML5 Haskell Java JavaScript Kotlin Go PowerShell Python TypeScript Bash Script Windows Terminal Glitch Google Cloud Azure Heroku AWS Cloudflare Netlify Datadog DigitalOcean Codeberg Firebase OpenStack .Net Anaconda Angular Ant-Design Bootstrap Apache Kafka Apache Hadoop Django Elasticsearch Express.js Flutter FastAPI Flask NPM OpenCV OpenGL NodeJS WordPress Apache Jenkins Nginx Apache Maven Apache Tomcat AmazonDynamoDB Firebase Hibernate MongoDB MySQL MicrosoftSQLServer Redis Adobe Adobe Lightroom Adobe Lightroom Classic Adobe Photoshop Inkscape Keras Matplotlib NumPy Pandas TensorFlow PyTorch scikit-learn Scipy GitLab Git GitHub Bitbucket Ansible Cisco CMake Gradle ElasticSearch Docker Confluence Jellyfin Jira Kubernetes Meta Notion OpenSea Prettier Power Bi Postman Terraform

πŸ“Š GitHub Stats:



πŸ† GitHub Trophies

✍️ Random Dev Quote

πŸ” Top Contributed Repo

🌐 Socials:

Popular repositories Loading

  1. CEHV12_StudyGuide CEHV12_StudyGuide Public

    Comprehensive training materials for the CEH v12 exam, including detailed modules, practical exercises, hands-on labs, and best practices. Also features references to CEHv9 exam practice questions …

    53 15

  2. kaja-World kaja-World Public

    welcome trainee

  3. E_PAM E_PAM Public

    Online learning Tutor

    Java

  4. Task2 Task2 Public

  5. vpncehck2 vpncehck2 Public

    checks if the vpn or proxy is connected test 2 deploy

    CSS

  6. vpncehck4 vpncehck4 Public

    checks if the vpn or proxy is connected test 5

    CSS