Cybersecurity Engineer & Quantum Computing Researcher. M.Tech graduate from MIT World Peace University, actively pursuing PhD in Quantum Computing Networks. Educator, researcher, and practitioner at the intersection of security, AI, and quantum technologies.
Cybersecurity Engineer ยท Quantum Researcher
I'm a self-motivated Cybersecurity Engineer with a strong foundation in Vulnerability Assessment & Penetration Testing (VAPT), API security, compliance frameworks, and application security. I completed my M.Tech in Cyber Security from MIT World Peace University, Pune and hold a B.Tech in Computer Science from Jaipur National University.
My research sits at the convergence of Quantum Computing, AI-driven security automation, and post-quantum cryptography. I actively teach quantum computing fundamentals and guide students in research methodology โ from ideation and paper writing to evaluation and publication.
I mentor PhD candidates in quantum computing research, helping them structure their work, understand current literature on PQC, QKD, and quantum networks, and develop publication-ready papers. I'm currently seeking a PhD position in Quantum Computing Networks.
Explores quality-of-service optimization in software-defined networking architectures to detect and mitigate distributed denial-of-service attacks through ML-based traffic classification.
Proposes a blockchain-backed IAM model for metaverse interoperability, with a focus on regulatory compliance, decentralized governance, and cross-platform digital identity.
Investigates the use of large language models and generative AI for automated security testing pipelines, vulnerability identification, and intelligent fix generation in enterprise environments.
Active research area examining NIST PQC standardization (CRYSTALS-Kyber, CRYSTALS-Dilithium) and their integration into existing TLS, VPN, and PKI infrastructure.
Research into BB84, E91, and continuous-variable QKD protocols, satellite-based QKD experiments, and integration challenges in classical telecom infrastructure.
Exploring quantum repeater architectures, quantum internet stack models (per Wehner et al.), and the security implications of entanglement-based routing โ core area for PhD pursuit.
Active educator and researcher in quantum computing. Teaching foundational and advanced quantum concepts to students, and guiding PhD candidates through research methodology, paper writing, and peer review preparation.
NIST-standardized algorithms resistant to quantum attacks โ Kyber, Dilithium, SPHINCS+
Physically secure key exchange using quantum mechanics โ BB84, E91, CV-QKD protocols
Open-source quantum SDK for circuit design, simulation, and real IBM quantum hardware access
Entanglement distribution, quantum repeaters, quantum internet stack โ PhD research focus
Google Sycamore, IBM Condor, practical thresholds for cryptographically relevant quantum computers
Foundational quantum algorithms threatening RSA/ECC and symmetric key length assumptions
Surface codes, stabilizer codes, logical qubit thresholds for fault-tolerant computation
Emerging HNDL threat model โ why organizations must migrate to PQC before Q-Day
From qubits to quantum circuits โ beginner to intermediate
Preparing security professionals for the quantum era
Hands-on penetration testing for real-world environments
Guiding candidates in quantum & security research
Understanding the timeline of cryptographically relevant quantum computers and what enterprises must do now to prepare for post-quantum migration.
A practical look at integrating GPT-based models and Gen-AI pipelines into SAST/DAST workflows and what it means for modern red teams.
From lab-scale entanglement to metropolitan QKD deployments โ a researcher's view of the quantum networking stack and where progress is happening fastest.
Breaking down the latest revision to the world's leading information security management standard and practical implementation considerations.
Practical walkthrough of Active Directory attack chains, from initial reconnaissance with BloodHound to credential harvesting and lateral movement.
How blockchain-based IAM systems address cross-platform identity challenges in metaverse ecosystems while satisfying compliance requirements.
NIST finalized FIPS 203/204/205 in 2024. Enterprises are now racing to audit crypto agility and migrate critical systems before Q-Day.
LLM-augmented SOC tooling, AI red teaming, and autonomous vulnerability scanners are redefining the security operations landscape.
Government-funded QKD testbeds expanding in EU, China, and India. Telecom operators actively piloting metropolitan QKD networks.
CNAPP platforms consolidating CSPM, CWPP, and CIEM. AWS, Azure, and GCP misconfigurations remain the top enterprise attack vector.
US Federal mandate pushing ZTA adoption. Identity-centric perimeter-less security is becoming the enterprise standard for 2025โ2026.
Research-stage quantum repeaters and entanglement-based networks edging toward pilot deployments. IBM, QuTech, and Toshiba leading development.
SBOM mandates, software supply chain attacks (XZ Utils style), and third-party risk management topping enterprise CISO agendas in 2025.
Early research into quantum-enhanced ML algorithms showing promise for optimization and anomaly detection use cases in cybersecurity.
Offensive Security Certified Professional โ OffSec
Certified Ethical Hacker โ EC-Council
Computer Hacking Forensic Investigator โ EC-Council
AWS Certified Cloud Practitioner โ Amazon
Red Hat Certified System Administrator โ Red Hat
๐ Pune, India ยท 2023 โ 2025
๐ Jaipur, Rajasthan ยท 2015 โ 2019
Research focus: quantum network protocols, post-quantum security, entanglement-based communication
Premium cotton tee, hacker aesthetic, available in black & white
Embroidered "0|1ใ" qubit graphic. Snapback, one size fits most
"sudo make coffee" ceramic mug, 350ml, microwave safe
Curated pentest cheatsheets, 120 pages, dotted grid, spiral bound
Whether you're a researcher looking for a collaborator, a student seeking quantum computing guidance, a PhD supervisor with an open position, or an organization with a security challenge โ I'd love to hear from you.