Ujas Bhadani Ujas Bhadani Author of Cybersecurity Aarticles Ujas is a leader whose work is shaping the future of digital security. Ujas Bhadani Ujas Bhadani

Ujas Bhadani

I'm

About Ujas

Ujas Bhadani is a security expert who has made significant contributions to the field and has mentored and inspired individuals, communities, and businesses to promote online safety and growth. An active researcher, he publishes his work in top international cybersecurity journals. He has led large-scale cybersecurity projects at Bosch and Xponential Fitnees. He is a highly motivated and results-oriented cybersecurity professional with over 6 years of experience in vulnerability management, threat intelligence, incident response, and secure network design. Throughout his career, he has successfully implemented security solutions that have mitigated thousands of vulnerabilities and significantly enhanced the overall security posture of organizations.



Ujas possesses proven skills in malware analysis and threat intelligence, allowing him to proactively secure systems. He excels at leading and mentoring security teams, fostering collaboration to drive security initiatives. His excellent communication skills enable him to translate complex technical concepts for any audience. Additionally, he is passionate about automating security processes to improve efficiency and remains committed to continuous learning, ensuring he stays abreast of the latest security threats and trends.



Ujas has hands-on experience with server hardening automation, cloud architecture, and risk assessments, and has made significant contributions to the academic field through published research. He brings dedication, innovative thinking, and the necessary skills to manage, monitor, and improve an organization's IT security infrastructure.

Resume

Academic Experience

Graduate Teaching Assistant

Jan 2022 - Dec 2023

Northeastern University

  • Mentored over 250 students in courses, such as Network Security Practices, Network Distributed Systems, and Foundations of Cybersecurity
  • Designed and implemented hands-on Threat Modeling, Brute Force Cyber Attack, Penetration Testing, and Palo Alto Firewall labs as a network engineer to perform cyber-attacks, enabling students to enhance their skills in identifying root causes to network configuration
  • Reinforced students with problem solving and configuration of Palo Alto firewall, routers, switches, cryptography, VPNs, IDS/IPS, and SIEM

Education

Master of Science in Cybersecurity

Northeastern University, Boston MA

Relevant Courses:

  • Computer System Security
  • Network Security Practices
  • Information System Forensics
  • Foundations of Information Assurance
  • Decision Making for Critical Infrastructure
  • Special Topics in IT Security Governance, Risk, and Compliance
  • Capstone Project

GPA: 3.75/4.00

Bachelor of Engineering in Computer Engineering

Gujarat Technological University

Ujas distinguished himself as the top-performing student in his cohort, achieving a remarkable 10/10 GPA in the 7th semester of his bachelor's degree. His exceptional academic performance demonstrates his dedication to excellence and his ability to consistently deliver outstanding results.

GPA: 9.56/10.00

Professional Experience

Cyber Security Engineer

Apr 2024 - Present

Xponential Fitness LLC - Irvine, CA

  • Implementing DMARC, DKIM, and SPF authentication protocols for marketing vendors to enhance email security, resulting in a 90% reduction in phishing and spoofing incidents and improved email deliverability and customer trust
  • Leading a dynamic security team, orchestrating efforts to identify, mitigate, and respond to endpoint threats using CrowdStrike and Bitdefender, resulting in the mitigation of over 45k vulnerabilities
  • Advising management on cybersecurity framework policies such as HIPPA and NIST, while proposing comprehensive cybersecurity architecture and meeting system security requirements
  • Implementing and maintaining robust network security architectures in the public cloud environment (AWS), including firewalls, VPNs, and segregated networks, ensuring adherence to Zero-Trust principles and industry standards like SOC2
  • Following least access privileges, streamlining user provisioning and deprovisioning processes with Okta's automated workflows, reducing the risk of orphaned accounts
  • Automating patch management across diverse OS and software and monitoring of network devices and endpoints using Automox and N-central

Prodcut Security Engineer Co-op

Jan 2023 - July 2023

Bosch Home Comfort - Watertown, MA

  • Planned and executed IT audits using Tenable and network monitoring using SIEM tool, Splunk, including evaluating the effectiveness of security controls, risk management practices, and compliance with CSF and NIST SP800-115 industry standards framework regulatory requirements
  • Achieved a 40% increase in team efficiency as a project security manager by designing and testing security controls in the Greenbone tool, aligned with security architecture requirements and ISO 27001/27002 Framework
  • Evolved an extensive network stress test as part of the penetration testing for the IoT product, BCC, and slashed administration costs 30% by negotiating pricing, emphasizing strong customer relations
  • Formulated and implemented policies and procedures aimed at mitigating network intrusion, malware events, and vulnerability issues for both internal and external clientele

Cyber Security Engineer

Aug 2019 - Aug 2021

Electromech

  • Led the team to deploy security automation tooling by utilizing Ansible Automation; optimized security for network and server hardware (Red Hat, Fedora, Debian, Ubuntu) via playbooks; decreased server hardening time by 27%
  • Enhanced overall security posture of the large-scale hybrid cloud environment by implementing security measures with AWS IAM, AWS Security Hub, AWS Inspector, and AWS Config services, resulting in mitigation of 85% of threats and security vulnerabilities
  • Orchestrated comprehensive IT risk analysis of technological domains through the AWS CloudTrail service in partnership with four diverse departments, stakeholders, and cross-functional teams while employing Agile methodologies
  • Monitoring systems for irregular behavior using tools like Security Information and Event Management (SIEM), and implementing preventive measures such as network segmentation, access controls, and regular security audits to mitigate potential threats

Linux Security Administrator

Feb 2018 – July 2019

Red Hat Academy

  • Managed a mixed environment of Linux and Windows servers, including patch management, user accounts, and security configurations, resulting Improvement in server security posture by 15%
  • Conducted 10+ technical workshops, covering a wide range of topics, including Linux Fundamentals, CLI Commands, SELinux Security, Kernel Security, Operating System Configuration, Configuring and Securing SSH, and Containers for RHEL
  • Trained 80+ co-workers' for cyber awareness and vulnerability detection and assessment by organizing and delivering engaging workshops
  • Built a training module with hands labs for Linux and cloud security coursework aligned with Red Hat certifications such as RHCSA and RHCE

Security Skills

Cryptography
Digital Signatures
Threat Modeling
Software Automated Testing
Penetration Testing
Secure development life cycle (SDLC)
Information Security Audits
Internal Audit Procedures
Quantitative Risk Assessment
Risk Management
Decision Making
Enterprise Innovation & IT Governance

Skills

Languages & Operating System

YAML
C/C++
Python
SQL
Shell Scripting
Windows
Linux/Unix (Kali, Red Hat, Ubuntu)

Technologies

Ansible Automation
Docker
Kubernetes
OpenShift
Cisco Meraki Dashboard
Open Stack
AWS
Agile Methodologies
Azure
Hybrid Cloud Computing

Certificates

AWS Certified Solutions Architect - Associate (SAA-C03)
Red Hat Certified System Administrator - RHCSA
Red Hat Certified Engineer - RHCE
Red Hat OpenShift I: Containers & Kubernetes - DO180
Introduction to OpenShift Applications - DO101
Cisco Certified Network Associate - CCNA
Risk and Information Systems Control - CRISC
Certified Information Systems Security Professional - CISSP
CompTIA Security+

Standards & Frameworks

ISO 27001/2
NIST SP 800-37
NIST SP 800-100
ISACA IT Audit Framework
NIST SP 800-53
MITRE Framework
CIS AWS Foundations Benchmark

Tools & Services

LAN/WAN Networking, Nmap, TCP/IP, IP Routing, IDS, OSI model, VPNs
UDP, DNS, DHCP, FTP, LDAP, RIP, EIGRP, BGP, OSPF, TLS/SSL
X.509 Certificate, APIs
Shodan, Censys, pfSense/ASA Firewall, Wireshark, Ncrack, Snort, Metasploit, Terraform, OpenSSL, DLP
GitHub, Git, Nagios
EC2, AWS Inspector, AWS Security Hub, AWS Config, Lambda, IAM, ELB, ASG, S3, SQS
MySQL DynamoDB, Oracle, Setkey
OAUTH, NIST
MS office, Office365, PowerShell
PCI DSS, Kafka, Load Balancer
Jira, Trello, Teams, Slack

Projects

Risk Assessment

Analyzed potential Assets, Threats and Vulnerabilities for Mobileheartbeat.

Suggested Controls according to the NIST SP 800-53 standard.

Cyberattack DOS & DDOS

Performed DDOS attack on a system someone owned with a written permission of the owner, shut down internet and a website which was hosted locally.

Server Hardening Automation

Developed an automation script, written in YAML language, using Ansible Automation to harden the Linux server.

Red Hat Academy Web

Built website for Red Hat Academy - Silver Oak Group of Institute.

CI/CD Pipeline - AWS Lambda

Implemented CI/CD pipeline to deploy Lambda function on AWS.

Email Security: Behavioral Analysis of an Email

Leveraged the power of artificial intelligence and machine learning to examine the context in which an email is sent

Development of an AI-based Intrusion Detection System (IDS) using PCA and Random Forest

Aimed to confirm the hypothesis that an imbalance in datasets affects the efficiency in training of the model. A manuscript based on the results found is being written for publication. Selective undersampling and then oversampling through the Synthetic Minority Over-Sampling Technique (SMOTe) algorithm was implemented on the CIC IDS 2017 dataset

Penetration Testing in Docker Containers

Focused on exploring penetration testing scenarios in containerized environments. Used Docker technology to simulate penetration testing using various tools such as sqlmap, metasploit, nmap to successfully stress test vulnerable WordPress and database topologies

Research Paper

Hybrid Cloud: The New Generation of Indian Education Society

Cloud computing is a booming technology. There are four types of cloud models available for use. Such as Community Cloud, Public Cloud, Private Cloud, Hybrid Cloud. Every organization is moving toward opensource and cloud computing. Then the question arises, why don't we apply this method to our Indian education society? So, this review paper has all answers, including how you can deploy a hybrid cloud model for your institute. Hybrid cloud act as a bridge between education society and learners. It delivers all the required resources to students while maintaining proper privacy. This article's flow is organized as follows: Firstly, a brief introduction of cloud computing and its model, followed by cloud computing in education society, security algorithms, and finally, deployment of a hybrid cloud.

Verizon Telecommunication Network in Boston

Many people believe that the telecoms business is the most profitable sector on the planet. One hundred and ten million homes in the United States have telephones, fifty percent of all households in the United States have access to the internet, and there are over 170 million mobile customers. Since 2004, the annual revenues from long-distance service have been greater than 100 million dollars. The focus of this paper is on the Verizon Telecommunications network in Boston, which is in the United States of America. Verizon Communications Inc. was founded in New York City and incorporated in Delaware. On June 30, 2000, Bell Atlantic Corporation and GTE Corporation merged into a single company. On Monday, July 3, 2000, Verizon shares were first listed for trading under the ticker VZ on the New York Stock Exchange (NYSE). On March 10, 2010, it also began trading under some other symbol on the NASDAQ exchange. This paper contains a detailed view of telecommunication network nodes deployed in Boston, USA. Some of the essential nodes are deployed with the MBRA tool. In addition, I discussed a high-level understanding of topics like network characterization, the adjacency metric, node degrees, the network degree, link robustness, and the ability to remove links (critical links), the spectral radius, node robustness, the ability to remove nodes, blocking nodes that cannot be removed, node centrality, betweeness centrality, and eigenvector centrality.

Smart Grid Security: Innovative Approaches for Threat Detection and Countermeasures

Electric power networks are now more susceptible to cyberattacks due to their increased interconnectivity and digitization. The security of Smart Grids and the effects of cyberattacks on system functionality and operations are consequently raising concerns. This study addresses the growing concerns regarding the security of Smart Grids and the impact of cyberattacks on their functionality and operations. It provides an in-depth analysis of the various types, frequencies, and consequences of cyberattacks on Smart Grids, as well as their effects on system performance. Additionally, the survey explores a range of defense tactics and strategies that can be employed to mitigate the risk of cyberattacks on these systems. This study offers a thorough assessment of the state of cyber security in Smart Grids today and emphasizes the need for increased awareness and financial support for cyber security measures to safeguard these vital infrastructure components.

Weaponizing Phase: Living Off The Land Technique

When it comes to analyzing and preventing cyber assaults, the cyber death chain is a vital foundation to have. The phase of weaponization is the most important of the seven phases since it is the phase that changes the information that has been obtained into a danger that can be easily seen. The objective of this step is to generate malicious payloads that are intended to take advantage of the vulnerabilities that have been discovered in the system that is the target of the attack. The weaponization strategy known as "Living Of the Land" (LOTL) is one that deserves special attention. In this approach, the of enders generate their harmful payloads by using normal tools and procedures, which makes detection more difficult. In this research, the complexities of the weaponization phase are investigated, as well as the way in which the LOFT approach improves the concealment and effectiveness of cyber assaults. This highlights the need of developing more sophisticated detection and prevention measures.

Smart Grids: A Cyber–Physical Systems Perspective

Smart grids are electric networks that use cutting-edge monitoring, controlling, and communication technology to deliver a safe and stable energy supply, improve the efficiency of operation for generators and distributors, and offer consumers various options. The mix of sophisticated physical network systems and cyber systems that make up smart grids presents various technical difficulties. This paper will give a general overview of these difficulties in the context of cyber-physical systems. After that, we'll discuss the potential benefits that cyber-physical systems could provide to smart grids, as well as the difficulties that smart grids pose for these systems. Finally, the effects of recent technological developments on smart grids are addressed.

Weaponizing Phase: Living Off the Land Technique

When it comes to analyzing and preventing cyber assaults, the cyber death chain is a vital foundation to have. The phase of weaponization is the most important of the seven phases since it is the phase that changes the information that has been obtained into a danger that can be easily seen. The objective of this step is to generate malicious payloads that are intended to take advantage of the vulnerabilities that have been discovered in the system that is the target of the attack. The weaponization strategy known as "Living Of the Land" (LOTL) is one that deserves special attention. In this approach, the of enders generate their harmful payloads by using normal tools and procedures, which makes detection more difficult. In this research, the complexities of the weaponization phase are investigated, as well as the way in which the LOFT approach improves the concealment and effectiveness of cyber assaults. This highlights the need of developing more sophisticated detection and prevention measures.

Pillars of Power System and Security of Smart Grid

When a complex physical network system and a cyber network are combined to form a smart grid, numerous technical challenges arise. The electric power grid’s basic struc- ture hasn’t evolved in the last century. It has been demonstrated that the needs of the twenty-first century cannot be met by a hierarchical, centralized organization. While the information and communication infrastructure that supports present electricity systems is strong, the new smart grid requires a separate, much more complicated infrastructure due to its much larger size. Smart grids are electric networks that use cutting-edge monitor- ing, controlling, and communication technology to deliver a safe and stable energy supply, improve the efficiency of operation for generators and distributors, and offer consumers various options. A multipurpose electric power grid system, the smart grid offers improved efficiency, dependability, and other advantages. This power system will be improved in order to increase efficiency and safety, lessen its impact on the environment, and give customers more control over the network. In this survey report, we will gain a better understanding and a comprehensive overview of the concept of the smart grid.

Advanced Email Security with NLP and the Isolation Forest Algorithm

Email security is crucial in today's digital age, as it serves as the primary means of communication for individuals and businesses alike. Therefore, it is vulnerable to various cyber threats like phishing, malware, and spam. These threats can lead to data breaches, financial losses, and the theft of private information. This study introduces a comprehensive approach to detect unusual patterns in emails using artificial intelligence. It specifically emphasizes the integration of Natural Language Processing (NLP) and the Isolation Forest algorithm. Key contributions encompass techniques for gathering and organizing email datasets, the utilization of TF-IDF vectorization to transform email text into numerical characteristics, the integration of the Isolation Forest algorithm to detect anomalies in email behavior, and the assessment of model effectiveness through metrics like Precision, Recall, F1-Score, and ROC-AUC. In addition, the system demonstrates excellent scalability, flexibility, and accuracy when it comes to real-world email security scenarios. This demonstrates the effectiveness of combining natural language processing (NLP) with machine learning (ML) to enhance email security and offers a robust solution for detecting and mitigating cyber-attacks.

Recommandations

Has is excellent example of self motivated and initiative person. He possess good Linux knowledge. He is also developing good leadership at Silveroak. Good human being.

Nilesh Vaghela

Founder at ElectroMech, AWS Community Hero, AAI, RHCI

He's a stellar cybersecurity pro, skilled and dedicated. His expertise makes him an asset, fortifying organizations with strong security and safeguarding against threats.

Viren Patel

Supply Chain Business Analyst at AERCO International, Inc.

Ujas possesses strong knowledge of cybersecurity, hybrid cloud, cloud computing, ansible, and Linux. His sincerity, intelligence, and leadership as a Student Ambassador are commendable.

Darshil Shah

CEO at Sperious

Ujas was my student at Northeastern University's M.Sc. in Cybersecurity program. He was a great team player and he greatly contributed to the class. I was very pleased with his performance and happy to have him in my class. He is a passionate and promising cyber security professional who will contribute to the greater good of safe cyber world.

Mardiros Merdinian

Professor, Adjunct Faculty at Northeastern University

Has is excellent example of self motivated and initiative person. He possess good Linux knowledge. He is also developing good leadership at Silveroak. Good human being.

Nilesh Vaghela

Founder at ElectroMech, AWS Community Hero, AAI, RHCI

He's a stellar cybersecurity pro, skilled and dedicated. His expertise makes him an asset, fortifying organizations with strong security and safeguarding against threats.

Viren Patel

Supply Chain Business Analyst at AERCO International, Inc.

Ujas possesses strong knowledge of cybersecurity, hybrid cloud, cloud computing, ansible, and Linux. His sincerity, intelligence, and leadership as a Student Ambassador are commendable.

Darshil Shah

CEO at Sperious

Ujas was my student at Northeastern University's M.Sc. in Cybersecurity program. He was a great team player and he greatly contributed to the class. I was very pleased with his performance and happy to have him in my class. He is a passionate and promising cyber security professional who will contribute to the greater good of safe cyber world.

Mardiros Merdinian

Professor, Adjunct Faculty at Northeastern University

Has is excellent example of self motivated and initiative person. He possess good Linux knowledge. He is also developing good leadership at Silveroak. Good human being.

Nilesh Vaghela

Founder at ElectroMech, AWS Community Hero, AAI, RHCI

He's a stellar cybersecurity pro, skilled and dedicated. His expertise makes him an asset, fortifying organizations with strong security and safeguarding against threats.

Viren Patel

Supply Chain Business Analyst at AERCO International, Inc.

Contact

I am actively seeking full-time employment in the field of Cybersecurity. If there are any open positions available or if you have any questions regarding my qualifications, please do not hesitate to reach out and connect with me.

LinkedIn:

Ujas Bhadani