Skip to content
View kakshaykumar's full-sized avatar

Highlights

  • Pro

Block or report kakshaykumar

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kakshaykumar/README.md

Hi There :) - I'm Akshaykumar 👋

Cybersecurity Graduate Student · Cybersecurity SME Intern · Graduate Teaching Assistant · Former Network Security TAC Engineer · Actively Looking for Full-time Opportunities

3 years enterprise HPE-Aruba network security experience → MS AIT in Cybersecurity @ GMU → MSSP Cybersecurity SME Intern → Graduate Teaching Assistant

I spent three years as a Network Security TAC Engineer at Movate, supporting enterprise HPE-Aruba deployments, troubleshooting production incidents, analyzing security logs and events using NMS and SIEM tools like HPE Intelligent Management Center, Splunk, SolarWinds, and Aruba Central.

Running VAPT cycles with Qualys and Nessus, hardening access controls, and securing enterprise environments running Comware, Aruba ProCurve, ArubaOS CX, and Aruba Central. Daily hands-on packet analysis and traffic diagnosis with Wireshark and Nmap — often replicating customer issues in simulated lab environments before pushing fixes to live networks.

That operational background pushed me toward Cybersecurity formally. I left Movate to pursue a Master's in Cybersecurity at George Mason University. During the program I worked within Comtech LLC's MSSP practice as a Cybersecurity SME Intern — supporting client security engagements end-to-end, from whitepapers and proposals through threat assessments and managed service delivery. Now I'm teaching Information Security Fundamentals as a Graduate Teaching Assistant while finishing the degree.


Graduated

  • 🎓 MS Applied Information Technology (Cybersecurity) @ George Mason University — GPA 3.77 — May 2026
  • 👨‍🏫 Graduate Teaching Assistant — IT 223: Information Security Fundamentals @ GMU (Aug 2025 – May 2026)

Currently

  • ✍️ Writing CTF writeups on Medium — OverTheWire Natas series
  • 🎯 Actively working on hands-on Projects and CompTIA Security+ Certification
  • 🔬 Building a multi-platform cloud security assessment (AWS + Azure + GCP)

Experience

👨‍🏫 Graduate Teaching Assistant — George Mason University (Aug 2025 – May 2026)

Supporting IT 223 (Information Security). Conduct weekly office hours, guide students through ZyBooks hands-on labs (malware analysis, email phishing, security basics), grade assignments with detailed feedback, and support 200+ students via office hours and emails throughout the semester.


🛡️ Cybersecurity SME Intern (MSSP)— Comtech LLC, Reston VA (May 2025 – Aug 2025)

Worked within Comtech's MSSP practice as a technical security resource across client engagements in healthcare and US State/Local Government — covering the full managed security service lifecycle from client outreach and requirement gathering through threat assessments, gap analyses, and service delivery.

  • Conducted threat assessments for client healthcare IT infrastructure using STRIDE and DREAD frameworks — identifying vulnerabilities, prioritizing risks, and producing client-facing reports
  • Initiated and configured a Home SOC Lab environment to simulate threat detection and incident response workflows — used to demonstrate MDR capabilities and validate security monitoring approaches for client engagements
  • Authored 2-3 technical whitepapers and supported cybersecurity bid/proposal development for government and healthcare contracts
  • Developed a Managed Services Package covering network and web security tooling, gap assessment methodology, and service delivery checklists
  • Evaluated security solutions against client requirements and budgets; briefed senior management on emerging tools and market trends relevant to Comtech's service portfolio
  • Supported Comtech's CMMC initiative and participated in weekly reviews for active State/Local Government client engagements

🌐 Network Security TAC Engineer (L1 → L2 Escalation Engineer) — Network Security & Infrastructure Operations Movate Technologies / HPE-Aruba Networking (Sep 2021 – Jul 2024)

Three years supporting enterprise HPE-Aruba environments — HPE Comware, ProCurve, ArubaOS CX, Aruba Central, and HPE IMC — with a consistent security operations component alongside the networking work. Operated daily with SolarWinds, Splunk (log aggregation), Qualys and Nessus (VAPT cycles), Wireshark, and Nmap on live customer networks. Handled OSPF, BGP, MPLS, DHCP, and STP troubleshooting including Cisco and Arista cross-platform incidents. Implemented and validated 802.1X, RADIUS, and TACACS+ access controls for enterprise customers. Progressed from L1 to L2 escalation engineer and trained junior team members.


Portfolio

Hands-on projects from coursework and independent research — real tools, real findings, real artifacts.

Repository What it covers Course
🔬 network-security-labs Nessus vulnerability scanning, Wireshark 5-protocol analysis, NAT/VPN behavior — live environments, real output Cybersecurity Fundamentals
⚔️ applied-security-labs SQL injection with annotated attack code · RSA-2048 with real .pem keypair and .enc artifact Cybersecurity Fundamentals
☁️ cloud-security-iaas Hands-on IaaS security assessment — Azure vs GCP defaults, IAM/logging gaps, CIS/NIST hardening checklist Cloud Computing
🔍 malware-progression-detection Research: malware evolution from viruses to APTs, hybrid detection framework (signature + behavior + ML) Network & Systems Security
🛡️ identity-theft-research Research: Equifax, Cambridge Analytica, T-Mobile case studies — IAM controls, MFA strategy, attack vectors Identity & Access Management

In Progress(artifacts will be published): Academic hands-on projects and assignments:

  • 🔒 Secure Software Development — 6 hands-on security labs
  • 📊 Information: Representation, Processing and Visualization - Understanding Victim Demographics for Violence Reduction in Chicago
  • 🧮 Data Structures & Algorithms — Shortest Path Computation for Self-Driving Cars Using Dijkstra and A* Algorithms

Technical Skills

Security Monitoring & SIEM Splunk SPL Queries Microsoft Sentinel Wazuh Microsoft Defender SOAR Windows Event Viewer Windows Registry

Threat Detection & Analysis Nessus Qualys Metasploit Wireshark Nmap Autopsy Burp Suite

Frameworks & Standards MITRE ATT&CK NIST Incident Response Lifecycle OWASP Top 10 STRIDE DREAD CVSS VAPT

Cloud Security AWS Microsoft Azure Google Cloud Platform GuardDuty CloudTrail AWS Security Hub Defender for Cloud Security Command Center Cloud Logging VPC/NSG

Networking & Infrastructure HPE Comware ArubaOS CX Aruba Central HPE IMC ProCurve Cisco Arista SolarWinds VLANs STP OSPF BGP MPLS IPSec SSL/TLS 802.1X RADIUS TACACS+

Identity & Access Management Active Directory Azure Entra ID IAM RBAC

Operating Systems & Scripting Linux Distros Windows PowerShell Python SQL Bash Git GitHub


Certifications

  • 🏅 ISC2 Certified in Cybersecurity (CC)
  • ☁️ Microsoft Certified: Azure Fundamentals (AZ-900)
  • 🔍 Splunk Certified Core User Training (Hands-on Coursework)
  • 🛡️ Fortinet Certified Associate Cybersecurity (FCA)
  • 🛡️ Fortinet Certified Fundamentals Cybersecurity (FCF)
  • 🔒 TryHackMe Pre-Security Certificate
  • 🎯 CompTIA Security+ — In progress

Background

🎓 ECE📡 CCNA🌐 HPE-Aruba Network Security TAC (3 yrs · L1→L2)🔐 MS Cybersecurity @ GMU🛡️ MSSP Cybersecurity SME Intern👨‍🏫 Graduate TA

I started in Electronics and Communications Engineering at Jeppiaar Maamallan Engineering College — and by my third year realized I needed to find something I'd actually care about long-term. After exploring software development, embedded systems, and web dev - networking became the entry point into security.

My Logic: Understand how everything connects, then learn how to Defend it.

That led to CCNA, then three years at Movate on the HPE-Aruba TAC team. Real enterprise networks, real incidents, real customers. The security component was there from the start — VAPT work, access control hardening, log analysis in Splunk, flagging misconfigurations. Started mentoring junior engineers after about a year, promoted to L2 escalation engineer after two. Once networking had given me what I came for — a deep operational understanding of how infrastructure actually works — I made the move to George Mason to formalize the security side.

Networking continuing to strengthen my security perspective.

Since then: an MSSP internship at Comtech where I worked the full security engagement lifecycle from proposals to delivery, a teaching role supporting undergraduates through their first real security coursework, and a growing portfolio of hands-on security projects spanning network security, cloud security, IAM, and offensive security techniques.


Writing

CTF walkthrough articles on Medium:


Connect

LinkedIn Medium Email Email


Fairfax, VA · Open to full-time cybersecurity roles (Security Operations · Network Security · Cloud Security) starting May 2026

Popular repositories Loading

  1. malware-progression-detection malware-progression-detection Public

    Analyzes the evolution of malware and explores modern techniques for detecting and mitigating advanced cyber threats.

  2. identity-theft-research identity-theft-research Public

    Identity theft - Case Studies, Attack Vectors, Business Impact. How it could have been prevented and counter measures taken to avoid such incidents in the future.

  3. network-security-labs network-security-labs Public

    Cybersecurity lab portfolio showcasing real-world experience in vulnerability scanning, traffic analysis, and network security fundamentals.

  4. applied-security-labs applied-security-labs Public

    Practical security labs: SQL injection attack with annotated code and RSA-2048 asymmetric cryptography with real keypair artifacts

  5. cloud-security-iaas cloud-security-iaas Public

    Comparative security evaluation of default Infrastructure-as-a-Service (IaaS) configurations in Microsoft Azure and Google Cloud Platform (GCP), focus on IAM controls, storage security, encryption …

  6. kakshaykumar kakshaykumar Public