| 🎓 Degree | MS Computer Security — EPITA, Paris · B.Tech CSE — SMVEC, Puducherry |
| 💼 Experience | Security Policy Developer @ Orange Innovation · Data Privacy & Innovation Team, Châtillon |
| 🎯 Focus | VAPT · SOC · eBPF · Network Security · DFIR |
| 🏆 CTF | TryHackMe · RootMe |
| 🌍 Languages | English (C1) · Tamil (Native) · French (B1) |
| 📍 Status | 🟢 Open to Work |
|
Orange Innovation · Data Privacy & Innovation Team · Châtillon, Paris |
- 🔬 Researched eBPF integration in Android mobile security — system call control & traffic monitoring
- 🕵️ Identified eBPF operation patterns across Android OS for credential risk detection
- 🛡️ Designed & implemented BPFroid — a novel mobile malware detection framework using eBPF
- 🔍 Assessed OS-level compatibility and explored proof-of-concept credential-based threat detection
eBPF Android Linux Security Research
🔨 Building hands-on, lab-based projects to deepen SOC, malware analysis, and threat research skills.
|
Signature Scanner + VirusTotal Two-layer threat detection engine: local signature/hash matching + live VirusTotal cloud intelligence. Detects, flags, and reports malicious files — mimicking core production AV logic.
|
Honeypot & MITRE ATT&CK Mapping Ubuntu-based SOC lab: Wazuh SIEM for centralised logging, Cowrie SSH honeypot for attacker trapping, and auditd for endpoint monitoring. Custom detection rules + attack simulations mapped to MITRE ATT&CK.
|
|
SIEM/XDR Detection Engineering SOC simulation detecting real-world attacks: database exfiltration, credential theft, insider enumeration. Custom rules, active response, and full incident timelines documented.
|
Kernel-Level Attack Research Mapping eBPF abuse for stealth, persistence & privilege escalation across Linux, containers & cloud-native. Building attack taxonomy: rootkit behaviours, verifier-bypass CVEs, and CAP_BPF/CAP_PERFMON hardening defences.
|
|
Solved 10 Docker-based security challenges. Built a DVWA container environment, ran structured penetration tests, and documented all findings professionally.
|
Full-scope VA: port/service enumeration, OS discovery, vulnerability scanning across networking layers, and web server assessment with severity-rated documentation.
|
|
Identified & exploited IDOR, XSS → JWT token theft, and API flaws. Methodology: passive recon, credential analysis, privilege escalation — full OWASP Top 10 coverage.
|
Documenting TryHackMe room solutions & cybersecurity walkthroughs — methodology, tools, and key takeaways for the community.
|
| Project | Description | Stack | |
|---|---|---|---|
01 |
🔑 Password Cracking Tool | Distributed cracking system — Kubernetes, Docker & bcrypt with multiprocessing. Presented to cybersecurity professionals. | Kubernetes Docker Python bcrypt |
02 |
🖥️ Incident Response — Hardware Dump | Forensic investigation extracting artefacts from a compromised server. Full timeline report produced. | DFIR Kali Linux Disk Imaging Timeline |
03 |
🛒 Web Application Security Audit | CWE-based vulnerability identification & risk scoring on an e-commerce platform. | OWASP Top 10 VAPT CWE |
04 |
🗄️ Software & Database Audit | CWE classification of vulnerabilities across software & database systems. Risk & severity scoring. | CWE Database Security Auditing |
05 |
🔐 Password Manager Tool | Secure credential storage using Fernet symmetric encryption and salting. | Python Cryptography Fernet Salting |
📖 Detailed walkthroughs of TryHackMe rooms — methodology, tools used, and key takeaways.
|
Billing system vulnerability room. Covers service enumeration, SUID binary privilege escalation, and flag extraction through system misconfigurations on a realistic Linux target. |
Insider threat simulation. Bash history, cron job, and log analysis to reconstruct a full attacker timeline from artefacts left on a compromised Linux system. |
|
Web exploitation room. Directory & source-code enumeration, command injection via web panel, and chained privilege escalation to retrieve all 3 hidden flags. |
OSINT investigation room. Reverse image search, metadata extraction, and geolocation to piece together a narrative and uncover hidden details across public sources. |
🛡️ Security & Tools Kali Linux · Wireshark · Nmap · Splunk · Wazuh · Burp Suite
☁️ Infrastructure & Platforms Docker · Kubernetes · Linux · Ubuntu · Cisco Packet Tracer
📋 Frameworks & Standards OWASP Top 10 · MITRE ATT&CK · ISO 27001 · NIST · GDPR
💻 Languages & Scripting Python · Bash
|
EPITA — École Pour l'Informatique et les Techniques Avancées · Paris, France |
|
Sri Manakula Vinayagar Engineering College · Puducherry, India |
SOC Analyst L1 · Cybersecurity Analyst · Network Engineer L1 · Vulnerability Analyst · Information Security Analyst
| 🐙 GitHub | ✍️ Medium | ||
|---|---|---|---|
| ramyaradjesh1@gmail.com | ramya-radjesh | ramyaradjesh | @ramya15112000 |
| 🎯 TryHackMe | 🌐 Portfolio | |
|---|---|---|
| ramyaradjesh | Novel_Throat3177 | ramyaradjesh.github.io |
⭐ If you find my work useful, feel free to star my repos — it means a lot!

