About Ujas
Ujas Bhadani is a security expert who has made significant contributions to the field and has mentored and inspired individuals, communities, and businesses to promote online safety and growth. An active researcher, he publishes his work in top international cybersecurity journals. He has led large-scale cybersecurity projects at Bosch and Xponential Fitnees. He is a highly motivated and results-oriented cybersecurity professional with over 6 years of experience in vulnerability management, threat intelligence, incident response, and secure network design. Throughout his career, he has successfully implemented security solutions that have mitigated thousands of vulnerabilities and significantly enhanced the overall security posture of organizations.
Ujas possesses proven skills in malware analysis and threat intelligence, allowing him to proactively secure systems. He excels at leading and mentoring security teams, fostering collaboration to drive security initiatives. His excellent communication skills enable him to translate complex technical concepts for any audience. Additionally, he is passionate about automating security processes to improve efficiency and remains committed to continuous learning, ensuring he stays abreast of the latest security threats and trends.
Ujas has hands-on experience with server hardening automation, cloud architecture, and risk assessments, and has made significant contributions to the academic field through published research. He brings dedication, innovative thinking, and the necessary skills to manage, monitor, and improve an organization's IT security infrastructure.
Resume
Academic Experience
Graduate Teaching Assistant
Jan 2022 - Dec 2023
Northeastern University
- Mentored over 250 students in courses, such as Network Security Practices, Network Distributed Systems, and Foundations of Cybersecurity
- Designed and implemented hands-on Threat Modeling, Brute Force Cyber Attack, Penetration Testing, and Palo Alto Firewall labs as a network engineer to perform cyber-attacks, enabling students to enhance their skills in identifying root causes to network configuration
- Reinforced students with problem solving and configuration of Palo Alto firewall, routers, switches, cryptography, VPNs, IDS/IPS, and SIEM
Education
Master of Science in Cybersecurity
Northeastern University, Boston MA
Relevant Courses:
- Computer System Security
- Network Security Practices
- Information System Forensics
- Foundations of Information Assurance
- Decision Making for Critical Infrastructure
- Special Topics in IT Security Governance, Risk, and Compliance
- Capstone Project
GPA: 3.75/4.00
Bachelor of Engineering in Computer Engineering
Gujarat Technological University
Ujas distinguished himself as the top-performing student in his cohort, achieving a remarkable 10/10 GPA in the 7th semester of his bachelor's degree. His exceptional academic performance demonstrates his dedication to excellence and his ability to consistently deliver outstanding results.
GPA: 9.56/10.00
Professional Experience
Cyber Security Engineer
Apr 2024 - Present
Xponential Fitness LLC - Irvine, CA
- Implementing DMARC, DKIM, and SPF authentication protocols for marketing vendors to enhance email security, resulting in a 90% reduction in phishing and spoofing incidents and improved email deliverability and customer trust
- Leading a dynamic security team, orchestrating efforts to identify, mitigate, and respond to endpoint threats using CrowdStrike and Bitdefender, resulting in the mitigation of over 45k vulnerabilities
- Advising management on cybersecurity framework policies such as HIPPA and NIST, while proposing comprehensive cybersecurity architecture and meeting system security requirements
- Implementing and maintaining robust network security architectures in the public cloud environment (AWS), including firewalls, VPNs, and segregated networks, ensuring adherence to Zero-Trust principles and industry standards like SOC2
- Following least access privileges, streamlining user provisioning and deprovisioning processes with Okta's automated workflows, reducing the risk of orphaned accounts
- Automating patch management across diverse OS and software and monitoring of network devices and endpoints using Automox and N-central
Prodcut Security Engineer Co-op
Jan 2023 - July 2023
Bosch Home Comfort - Watertown, MA
- Planned and executed IT audits using Tenable and network monitoring using SIEM tool, Splunk, including evaluating the effectiveness of security controls, risk management practices, and compliance with CSF and NIST SP800-115 industry standards framework regulatory requirements
- Achieved a 40% increase in team efficiency as a project security manager by designing and testing security controls in the Greenbone tool, aligned with security architecture requirements and ISO 27001/27002 Framework
- Evolved an extensive network stress test as part of the penetration testing for the IoT product, BCC, and slashed administration costs 30% by negotiating pricing, emphasizing strong customer relations
- Formulated and implemented policies and procedures aimed at mitigating network intrusion, malware events, and vulnerability issues for both internal and external clientele
Cyber Security Engineer
Aug 2019 - Aug 2021
Electromech
- Led the team to deploy security automation tooling by utilizing Ansible Automation; optimized security for network and server hardware (Red Hat, Fedora, Debian, Ubuntu) via playbooks; decreased server hardening time by 27%
- Enhanced overall security posture of the large-scale hybrid cloud environment by implementing security measures with AWS IAM, AWS Security Hub, AWS Inspector, and AWS Config services, resulting in mitigation of 85% of threats and security vulnerabilities
- Orchestrated comprehensive IT risk analysis of technological domains through the AWS CloudTrail service in partnership with four diverse departments, stakeholders, and cross-functional teams while employing Agile methodologies
- Monitoring systems for irregular behavior using tools like Security Information and Event Management (SIEM), and implementing preventive measures such as network segmentation, access controls, and regular security audits to mitigate potential threats
Linux Security Administrator
Feb 2018 – July 2019
Red Hat Academy
- Managed a mixed environment of Linux and Windows servers, including patch management, user accounts, and security configurations, resulting Improvement in server security posture by 15%
- Conducted 10+ technical workshops, covering a wide range of topics, including Linux Fundamentals, CLI Commands, SELinux Security, Kernel Security, Operating System Configuration, Configuring and Securing SSH, and Containers for RHEL
- Trained 80+ co-workers' for cyber awareness and vulnerability detection and assessment by organizing and delivering engaging workshops
- Built a training module with hands labs for Linux and cloud security coursework aligned with Red Hat certifications such as RHCSA and RHCE
Security Skills
Skills
Languages & Operating System
Technologies
Certificates
Standards & Frameworks
Tools & Services
Projects
Risk Assessment
Analyzed potential Assets, Threats and Vulnerabilities for Mobileheartbeat.
Suggested Controls according to the NIST SP 800-53 standard.
Cyberattack DOS & DDOS
Performed DDOS attack on a system someone owned with a written permission of the owner, shut down internet and a website which was hosted locally.
Server Hardening Automation
Developed an automation script, written in YAML language, using Ansible Automation to harden the Linux server.
Email Security: Behavioral Analysis of an Email
Leveraged the power of artificial intelligence and machine learning to examine the context in which an email is sent
Development of an AI-based Intrusion Detection System (IDS) using PCA and Random Forest
Aimed to confirm the hypothesis that an imbalance in datasets affects the efficiency in training of the model. A manuscript based on the results found is being written for publication. Selective undersampling and then oversampling through the Synthetic Minority Over-Sampling Technique (SMOTe) algorithm was implemented on the CIC IDS 2017 dataset
Penetration Testing in Docker Containers
Focused on exploring penetration testing scenarios in containerized environments. Used Docker technology to simulate penetration testing using various tools such as sqlmap, metasploit, nmap to successfully stress test vulnerable WordPress and database topologies
Research Paper
Hybrid Cloud: The New Generation of Indian Education Society
Cloud computing is a booming technology. There are four types of cloud models available for use. Such as Community Cloud, Public Cloud, Private Cloud, Hybrid Cloud. Every organization is moving toward opensource and cloud computing. Then the question arises, why don't we apply this method to our Indian education society? So, this review paper has all answers, including how you can deploy a hybrid cloud model for your institute. Hybrid cloud act as a bridge between education society and learners. It delivers all the required resources to students while maintaining proper privacy. This article's flow is organized as follows: Firstly, a brief introduction of cloud computing and its model, followed by cloud computing in education society, security algorithms, and finally, deployment of a hybrid cloud.
Verizon Telecommunication Network in Boston
Many people believe that the telecoms business is the most profitable sector on the planet. One hundred and ten million homes in the United States have telephones, fifty percent of all households in the United States have access to the internet, and there are over 170 million mobile customers. Since 2004, the annual revenues from long-distance service have been greater than 100 million dollars. The focus of this paper is on the Verizon Telecommunications network in Boston, which is in the United States of America. Verizon Communications Inc. was founded in New York City and incorporated in Delaware. On June 30, 2000, Bell Atlantic Corporation and GTE Corporation merged into a single company. On Monday, July 3, 2000, Verizon shares were first listed for trading under the ticker VZ on the New York Stock Exchange (NYSE). On March 10, 2010, it also began trading under some other symbol on the NASDAQ exchange. This paper contains a detailed view of telecommunication network nodes deployed in Boston, USA. Some of the essential nodes are deployed with the MBRA tool. In addition, I discussed a high-level understanding of topics like network characterization, the adjacency metric, node degrees, the network degree, link robustness, and the ability to remove links (critical links), the spectral radius, node robustness, the ability to remove nodes, blocking nodes that cannot be removed, node centrality, betweeness centrality, and eigenvector centrality.
Smart Grid Security: Innovative Approaches for Threat Detection and Countermeasures
Electric power networks are now more susceptible to cyberattacks due to their increased interconnectivity and digitization. The security of Smart Grids and the effects of cyberattacks on system functionality and operations are consequently raising concerns. This study addresses the growing concerns regarding the security of Smart Grids and the impact of cyberattacks on their functionality and operations. It provides an in-depth analysis of the various types, frequencies, and consequences of cyberattacks on Smart Grids, as well as their effects on system performance. Additionally, the survey explores a range of defense tactics and strategies that can be employed to mitigate the risk of cyberattacks on these systems. This study offers a thorough assessment of the state of cyber security in Smart Grids today and emphasizes the need for increased awareness and financial support for cyber security measures to safeguard these vital infrastructure components.
Weaponizing Phase: Living Off The Land Technique
When it comes to analyzing and preventing cyber assaults, the cyber death chain is a vital foundation to have. The phase of weaponization is the most important of the seven phases since it is the phase that changes the information that has been obtained into a danger that can be easily seen. The objective of this step is to generate malicious payloads that are intended to take advantage of the vulnerabilities that have been discovered in the system that is the target of the attack. The weaponization strategy known as "Living Of the Land" (LOTL) is one that deserves special attention. In this approach, the of enders generate their harmful payloads by using normal tools and procedures, which makes detection more difficult. In this research, the complexities of the weaponization phase are investigated, as well as the way in which the LOFT approach improves the concealment and effectiveness of cyber assaults. This highlights the need of developing more sophisticated detection and prevention measures.
Smart Grids: A Cyber–Physical Systems Perspective
Smart grids are electric networks that use cutting-edge monitoring, controlling, and communication technology to deliver a safe and stable energy supply, improve the efficiency of operation for generators and distributors, and offer consumers various options. The mix of sophisticated physical network systems and cyber systems that make up smart grids presents various technical difficulties. This paper will give a general overview of these difficulties in the context of cyber-physical systems. After that, we'll discuss the potential benefits that cyber-physical systems could provide to smart grids, as well as the difficulties that smart grids pose for these systems. Finally, the effects of recent technological developments on smart grids are addressed.
Weaponizing Phase: Living Off the Land Technique
When it comes to analyzing and preventing cyber assaults, the cyber death chain is a vital foundation to have. The phase of weaponization is the most important of the seven phases since it is the phase that changes the information that has been obtained into a danger that can be easily seen. The objective of this step is to generate malicious payloads that are intended to take advantage of the vulnerabilities that have been discovered in the system that is the target of the attack. The weaponization strategy known as "Living Of the Land" (LOTL) is one that deserves special attention. In this approach, the of enders generate their harmful payloads by using normal tools and procedures, which makes detection more difficult. In this research, the complexities of the weaponization phase are investigated, as well as the way in which the LOFT approach improves the concealment and effectiveness of cyber assaults. This highlights the need of developing more sophisticated detection and prevention measures.
Pillars of Power System and Security of Smart Grid
When a complex physical network system and a cyber network are combined to form a smart grid, numerous technical challenges arise. The electric power grid’s basic struc- ture hasn’t evolved in the last century. It has been demonstrated that the needs of the twenty-first century cannot be met by a hierarchical, centralized organization. While the information and communication infrastructure that supports present electricity systems is strong, the new smart grid requires a separate, much more complicated infrastructure due to its much larger size. Smart grids are electric networks that use cutting-edge monitor- ing, controlling, and communication technology to deliver a safe and stable energy supply, improve the efficiency of operation for generators and distributors, and offer consumers various options. A multipurpose electric power grid system, the smart grid offers improved efficiency, dependability, and other advantages. This power system will be improved in order to increase efficiency and safety, lessen its impact on the environment, and give customers more control over the network. In this survey report, we will gain a better understanding and a comprehensive overview of the concept of the smart grid.
Advanced Email Security with NLP and the Isolation Forest Algorithm
Email security is crucial in today's digital age, as it serves as the primary means of communication for individuals and businesses alike. Therefore, it is vulnerable to various cyber threats like phishing, malware, and spam. These threats can lead to data breaches, financial losses, and the theft of private information. This study introduces a comprehensive approach to detect unusual patterns in emails using artificial intelligence. It specifically emphasizes the integration of Natural Language Processing (NLP) and the Isolation Forest algorithm. Key contributions encompass techniques for gathering and organizing email datasets, the utilization of TF-IDF vectorization to transform email text into numerical characteristics, the integration of the Isolation Forest algorithm to detect anomalies in email behavior, and the assessment of model effectiveness through metrics like Precision, Recall, F1-Score, and ROC-AUC. In addition, the system demonstrates excellent scalability, flexibility, and accuracy when it comes to real-world email security scenarios. This demonstrates the effectiveness of combining natural language processing (NLP) with machine learning (ML) to enhance email security and offers a robust solution for detecting and mitigating cyber-attacks.
Recommandations
Contact
I am actively seeking full-time employment in the field of Cybersecurity. If there are any open positions available or if you have any questions regarding my qualifications, please do not hesitate to reach out and connect with me.
Email:
contact@ujasbhadani.com