Available for PhD & Research Collaboration

Subhash
Kumar

โ˜ Cybersecurity โš› Quantum Computing ๐Ÿค– AI Security ๐Ÿ” OSCP Certified

Cybersecurity Engineer & Quantum Computing Researcher. M.Tech graduate from MIT World Peace University, actively pursuing PhD in Quantum Computing Networks. Educator, researcher, and practitioner at the intersection of security, AI, and quantum technologies.

SK

Subhash Kumar

Cybersecurity Engineer ยท Quantum Researcher

3
Publications
5
Certifications
2+
Years Industry
M.Tech
Cyber Security
OSCP CEH v13 AWS CCP CHFI RHCSA
// WHO I AM

About Me

I'm a self-motivated Cybersecurity Engineer with a strong foundation in Vulnerability Assessment & Penetration Testing (VAPT), API security, compliance frameworks, and application security. I completed my M.Tech in Cyber Security from MIT World Peace University, Pune and hold a B.Tech in Computer Science from Jaipur National University.

My research sits at the convergence of Quantum Computing, AI-driven security automation, and post-quantum cryptography. I actively teach quantum computing fundamentals and guide students in research methodology โ€” from ideation and paper writing to evaluation and publication.

I mentor PhD candidates in quantum computing research, helping them structure their work, understand current literature on PQC, QKD, and quantum networks, and develop publication-ready papers. I'm currently seeking a PhD position in Quantum Computing Networks.

๐ŸŽ“

Seeking PhD โ€” Quantum Computing Networks

Interested in quantum network protocols, post-quantum cryptography, and AI-assisted quantum security. Open to research collaborations and PhD supervisor connections globally.

Technical Skills

VAPT Burp Suite Metasploit OWASP Top 10 Python Linux AWS Docker SAST/DAST SonarQube Active Directory BloodHound OSINT MITRE ATT&CK

Research Interests

Quantum Cryptography PQC (Post-Quantum) QKD IBM Qiskit Gen-AI Security LLM Security SDN Security Blockchain IAM

Compliance & GRC

ISO/IEC 27001 GRC Compliance Testing DevSecOps DevOps

Location & Languages

๐Ÿ“ Pune, Maharashtra ๐Ÿ‡ฌ๐Ÿ‡ง English (Professional) ๐Ÿ‡ฎ๐Ÿ‡ณ Hindi (Professional)
// CAREER

Experience

๐Ÿ›ก

Cybersecurity Intern

Tata Elxsi

Aug 2024 โ€“ Jun 2025 ยท Trivandrum, Kerala
  • Performed static and dynamic application security testing (SAST & DAST) and source code analysis using SonarQube and OWASP ZAP for web and Android applications.
  • Conducted penetration testing with tools like Burp Suite, Nmap, Wireshark, and Metasploit for vulnerability identification.
  • Integrated Gen-AI-powered automated code analysis and fix generation features into the in-house STAF tool.
  • Executed Active Directory penetration testing using BloodHound, CrackMapExec, and Mimikatz to assess domain security.
  • Supported compliance testing of embedded devices to ensure security and regulatory standards.
๐Ÿ“Š

Analyst

eClerx Services Ltd.

Apr 2021 โ€“ Jun 2022 ยท Pune, India
  • Designed and delivered automated dashboards and data-driven reports for client stakeholders.
  • Independently managed and optimized the web scraping infrastructure to ensure data accuracy and reliability.
  • Led process execution and coordinated team operations to meet client goals.
// ACADEMIA

Research & Publications

Google Scholar โ†—
Published

Implementation of QOS in SDN and Distributed Networks for Mitigation of DDoS-based Attacks using Machine Learning

Explores quality-of-service optimization in software-defined networking architectures to detect and mitigate distributed denial-of-service attacks through ML-based traffic classification.

SDNDDoSMachine LearningNetwork Security
Published

Blockchain-based Decentralized Identity & Access Management for Interoperable Metaverse Ecosystems: A Compliance-Oriented Governance Framework

Proposes a blockchain-backed IAM model for metaverse interoperability, with a focus on regulatory compliance, decentralized governance, and cross-platform digital identity.

BlockchainIAMMetaverseCompliance
Published

AI Driven Security: Automating Vulnerability Detection and Testing with Gen-AI and LLMs

Investigates the use of large language models and generative AI for automated security testing pipelines, vulnerability identification, and intelligent fix generation in enterprise environments.

Gen-AILLMsVAPTAutomation
Quantum Focus

Post-Quantum Cryptography (PQC) in Network Security Architectures

Active research area examining NIST PQC standardization (CRYSTALS-Kyber, CRYSTALS-Dilithium) and their integration into existing TLS, VPN, and PKI infrastructure.

PQCNISTLattice CryptoTLS
Quantum Focus

Quantum Key Distribution (QKD) Protocols & Practical Deployments

Research into BB84, E91, and continuous-variable QKD protocols, satellite-based QKD experiments, and integration challenges in classical telecom infrastructure.

QKDBB84PhotonicsQuantum Networks
Ongoing Interest

Quantum Computing Networks & Entanglement-based Communication

Exploring quantum repeater architectures, quantum internet stack models (per Wehner et al.), and the security implications of entanglement-based routing โ€” core area for PhD pursuit.

Quantum InternetEntanglementRepeatersQiskit

โš› Quantum Computing โ€” Key Concepts & Research Areas

Active educator and researcher in quantum computing. Teaching foundational and advanced quantum concepts to students, and guiding PhD candidates through research methodology, paper writing, and peer review preparation.

๐Ÿ”

Post-Quantum Cryptography (PQC)

NIST-standardized algorithms resistant to quantum attacks โ€” Kyber, Dilithium, SPHINCS+

๐Ÿ”‘

Quantum Key Distribution (QKD)

Physically secure key exchange using quantum mechanics โ€” BB84, E91, CV-QKD protocols

๐Ÿ’ป

IBM Qiskit

Open-source quantum SDK for circuit design, simulation, and real IBM quantum hardware access

๐ŸŒ

Quantum Networks

Entanglement distribution, quantum repeaters, quantum internet stack โ€” PhD research focus

โšก

Quantum Supremacy & Advantage

Google Sycamore, IBM Condor, practical thresholds for cryptographically relevant quantum computers

๐Ÿงฎ

Shor's & Grover's Algorithms

Foundational quantum algorithms threatening RSA/ECC and symmetric key length assumptions

๐Ÿ”—

Quantum Error Correction

Surface codes, stabilizer codes, logical qubit thresholds for fault-tolerant computation

๐Ÿ›ก

Harvest Now, Decrypt Later

Emerging HNDL threat model โ€” why organizations must migrate to PQC before Q-Day

// EDUCATION & TEACHING

Courses & Mentorship

โš›

Quantum Computing Fundamentals

From qubits to quantum circuits โ€” beginner to intermediate

๐Ÿ• 8 Weeks ๐Ÿ‘ค Beginnerโ€“Intermediate
Superposition Entanglement Qiskit Quantum Gates Grover's Algorithm
๐Ÿ”

Post-Quantum Cryptography

Preparing security professionals for the quantum era

๐Ÿ• 6 Weeks ๐Ÿ‘ค Intermediateโ€“Advanced
NIST PQC Lattice Crypto CRYSTALS-Kyber QKD Migration Strategy
๐Ÿ›ก

Ethical Hacking & VAPT

Hands-on penetration testing for real-world environments

๐Ÿ• 10 Weeks ๐Ÿ‘ค All Levels
Burp Suite Metasploit Web App Pentesting OWASP Top 10 AD Attacks
๐Ÿ“

PhD Research Mentorship

Guiding candidates in quantum & security research

๐Ÿ• Ongoing ๐Ÿ‘ค PhD Candidates
Paper Writing Research Methods Peer Review Quantum Networks Publication
// INSIGHTS

Latest Articles

All posts โ†’
๐Ÿ” Post-Quantum

What is Q-Day? The Coming Threat to All Encrypted Data

Understanding the timeline of cryptographically relevant quantum computers and what enterprises must do now to prepare for post-quantum migration.

6 min read Quantum ยท Cryptography
๐Ÿค– AI Security

Automating Penetration Testing with LLMs โ€” Possibilities & Pitfalls

A practical look at integrating GPT-based models and Gen-AI pipelines into SAST/DAST workflows and what it means for modern red teams.

8 min read AI ยท VAPT
๐ŸŒ Quantum Networks

Quantum Internet: Where Are We in 2025?

From lab-scale entanglement to metropolitan QKD deployments โ€” a researcher's view of the quantum networking stack and where progress is happening fastest.

10 min read QKD ยท Networks
๐Ÿ› Compliance

ISO/IEC 27001:2022 โ€” What Changed and Why It Matters

Breaking down the latest revision to the world's leading information security management standard and practical implementation considerations.

5 min read GRC ยท ISO 27001
โšก Active Directory

BloodHound, Mimikatz & Modern AD Attack Paths

Practical walkthrough of Active Directory attack chains, from initial reconnaissance with BloodHound to credential harvesting and lateral movement.

12 min read Red Team ยท AD
๐Ÿ”— Blockchain

Decentralized Identity in the Age of Web3 & Metaverse

How blockchain-based IAM systems address cross-platform identity challenges in metaverse ecosystems while satisfying compliance requirements.

7 min read Blockchain ยท IAM
// CREDENTIALS

Certifications

๐Ÿ”ด

OSCP

Offensive Security Certified Professional โ€” OffSec

โš”๏ธ

CEH v13

Certified Ethical Hacker โ€” EC-Council

๐Ÿ”

CHFI

Computer Hacking Forensic Investigator โ€” EC-Council

โ˜

AWS CCP

AWS Certified Cloud Practitioner โ€” Amazon

๐Ÿง

RHCSA

Red Hat Certified System Administrator โ€” Red Hat

// ACADEMIC

Education

๐ŸŽ“

M.Tech โ€” Cyber Security

MIT World Peace University

๐Ÿ“ Pune, India  ยท  2023 โ€“ 2025

๐Ÿ›

B.Tech โ€” Computer Science

Jaipur National University

๐Ÿ“ Jaipur, Rajasthan  ยท  2015 โ€“ 2019

โš›

PhD (Seeking) โ€” Quantum Computing Networks

Open to Opportunities Globally

Research focus: quantum network protocols, post-quantum security, entanglement-based communication

// NARAD SEC STORE

Merchandise

View store โ†’
๐Ÿ‘• New

NaradSec Logo Tee

Premium cotton tee, hacker aesthetic, available in black & white

โ‚น799
๐Ÿงข

Quantum Hacker Cap

Embroidered "0|1ใ€‰" qubit graphic. Snapback, one size fits most

โ‚น599
โ˜• Popular

Hacker's Mug

"sudo make coffee" ceramic mug, 350ml, microwave safe

โ‚น449
๐Ÿ“’

OSCP Cheat Sheet Notebook

Curated pentest cheatsheets, 120 pages, dotted grid, spiral bound

โ‚น349
// CONNECT

Get in Touch

Let's collaborate.

Whether you're a researcher looking for a collaborator, a student seeking quantum computing guidance, a PhD supervisor with an open position, or an organization with a security challenge โ€” I'd love to hear from you.