EARLY CAREER // STUDENTOPEN TO INTERNSHIPS & ENTRY-LEVEL ROLES

ROUNAK
NEEMA.

Rounak Neema
>SECURITY & INFRASTRUCTURE ENGINEER (EARLY CAREER)

Focused on cybersecurity, DevSecOps, and cloud security fundamentals through hands-on labs, CTFs, and self-built tools.

I’m a computer science student building a strong foundation in offensive security, cloud infrastructure, and security automation. I learn by breaking systems in controlled environments, fixing them with code, and documenting what I understand.

1st
Place @ Techfest
CTF Competition
100+
CTF Challenges
Solved (THM/HTB)
12+
Microservices
Docker • Go • AI
DevSecOps
Red Teaming
Automation

INTRODUCTION

I am an early-career DevOps and security-focused engineer with hands-on experience in cloud infrastructure, DevSecOps pipelines, security automation, and offensive security labs. This portfolio presents my technical skills, projects, and engineering background.

Unlike typical students, I don't just study theory. I build and break real infrastructure in my home lab. I have extensive hands-on experience deploying Kubernetes clusters, writing custom security tools in Go, and simulating Red Team operations in controlled environments.

Goal: Seeking an internship or entry-level role where I can contribute to securing cloud infrastructure and automating defense pipelines.

EDUCATIONNMIMS University
B.Tech CS (3rd Year)
FOCUSDevOps
Cybersecurity
LOCATIONShirpur, India
KEY INTERESTS
JavaGoNetworking

LANGUAGES

  • Go (Golang)
    High-performance tools & backend services.
  • Java
    Enterprise application development.
  • Python
    Automation scripts & security tools.
  • Bash / Shell
    Linux system automation.
  • SQL
    Effective database management.

SYSTEMS & SECURITY

  • Linux Internals
    Filesystems, processes, and permissions.
  • TCP/IP
    Raw sockets & packet analysis.
  • Vulnerability Testing
    Identifying exploitable flaws.
  • Detection Eng
    Writing rules for threat detection.

DEVOPS & INFRA

  • Docker
    Containerization & Microservices.
  • Kubernetes
    Orchestration & Cluster Management.
  • CI/CD
    Automated pipelines (GitHub Actions).
  • PostgreSQL/SQLite
    Database administration.

TOOLS

  • Git
    Version control & collaboration.
  • Burp Suite
    Web application security testing.
  • Wireshark
    Network protocol analysis.
  • Nmap
    Network mapper & reconnaissance.

Revealr

GOPYTHONSQLITE
The Challenge

Network scanning on local networks required high throughput and stateful tracking of changes.

The Solution

High-concurrency adaptive network scanner achieving 50k ports/min.

VIEW DETAILS
./revealr -target 10.10.11.0/24 --rate 50000
[+] Target: 10.10.11.15 (Linux/Ubuntu)
├── 22/tcp OPEN (ssh)
├── 80/tcp OPEN (http) -> nginx/1.18.0
└── 8080/tcp OPEN (http) -> Node.js Express
[*] Scan complete in 0.8s (50k pps)

OSA

GOOFFLINE-SECNO-DEPS
The Challenge

Security analytics in air-gapped environments is difficult without heavy dependencies like ELK/Splunk.

The Solution

Single-binary offline security auditor with statistical detection engines.

VIEW DETAILS
./osa --analyze --mode offline
[*] Loading log patterns...
[!] Anomaly Detected (Z-Score: 4.2): Auth Spike
└── Source: 192.168.1.105 (User: admin)
[+] Markov Chain: Deviation from standard transition matrix
[*] Report generated: analysis_report.json

MetroMind

MICROSERVICESDOCKERAI/OCR
The Challenge

Managing and searching large volumes of transit documents efficiently.

The Solution

AI-powered document intelligence platform with microservices architecture.

VIEW DETAILS
System Architecture

OPEN TO ROLES

  • DevSecOps Engineer / Intern
  • Cloud Security Engineer
  • Red Teaming / Offensive Security
  • Security Infrastructure Engineer
  • DevOps Engineer
  • Cybersecurity Analyst

WHAT I BRING

Strong Fundamentals: I don't just use tools; I understand the underlying protocols and systems they interact with.

Hands-on Mindset: I learn by doing. My labs and projects are proof of my ability to build, break, and fix.

Communication: I believe security is about enabling teams, not blocking them. I explain technical risks clearly.