VAPT Specialist · SOC Analyst · Security Engineer · Bug Bounty Hunter
Protecting institutions and organizations through hands-on penetration testing, endpoint security, threat detection, and responsible vulnerability disclosure — with credits from NASA and Stanford University.
Results-oriented Cybersecurity Analyst with hands-on expertise in VAPT, SOC Operations, Digital Forensics, IoT Security, and enterprise endpoint management at the Indian Institute of Science (IISc) — one of India's most prestigious research institutions.
Proven track record of discovering critical vulnerabilities, managing 500+ device onboarding to Microsoft Intune, implementing 200+ security policies, and driving zero-trust security initiatives across campus infrastructure.
Active bug bounty hunter with responsible disclosures to NASA, Stanford University, and multiple government portals — demonstrating real-world impact beyond institutional boundaries.
Enterprise-grade security expertise across offensive and defensive security disciplines, tailored for modern infrastructure.
Comprehensive vulnerability assessment and penetration testing of web apps, APIs, and infrastructure using industry-standard methodologies and OWASP Top 10 coverage.
24/7 threat monitoring, alert triage, EDR operations, threat hunting, and forensic investigation of live cyberattacks — identifying attack vectors and delivering hardening roadmaps.
Enterprise endpoint management via Microsoft Intune, compliance policy enforcement, LAPS password rotation, ASR rules, and zero-trust access control across 500+ devices.
Linux server hardening, SELinux policy enforcement, cloud security posture management via Microsoft Defender for Cloud (MDAPT), and Azure security configuration.
Continuous vulnerability scanning, CVSS-prioritized remediation reporting, OpenVAS assessments, and validated fix procedures delivered with step-by-step guidance.
Python-powered incident response automation, IOC/IOA parsing, honeypot log analysis, digital forensics, VM forensics, and NCCC compliance-aligned auditing workflows.
Responsible disclosure of critical vulnerabilities to world-class organizations — demonstrating real-world offensive security impact.
Practical security resources and tools built for the community — available at kirankumark.in/[project]
Comprehensive security hardening guides for WordPress, Node.js, React, Flutter, Linux Server, and API Security — covering OWASP Top 10, CIS Benchmarks, and VAPT remediation procedures with step-by-step fix guidance.
🌐 View Repository →Domain security awareness and analysis tool providing DNS reconnaissance, subdomain enumeration, threat intelligence correlation, and certificate transparency monitoring for proactive attack surface management.
🌐 View Repository →Architected and deployed Zero-Trust endpoint security framework across 500+ devices at IISc — enforced compliance policies, automated LAPS password rotation, and full Microsoft Defender for Endpoint integration.
📋 Read Case Study →Deployed Microsoft Defender for Cloud across all Linux servers, enforced SELinux mandatory access control policies, disabled xp_cmdshell on MSSQL — achieving comprehensive cloud security posture hardening.
📋 Read Case Study →Available for VAPT engagements, security consulting, bug bounty collaboration, and enterprise security projects.