Security research & offensive craft.

I build tools and break systems for a living - threat intelligence, vulnerability research, and automation that turns noise into signal. Currently studying Cyber Operations at the University of Arizona.

See selected work Get in touch
5+projects shipped
3.5GPA · Dean's List
100+weekly incidents triaged
3industry certs
Scroll
Selected Work / 01

Tools I've built, bugs I've found.

A short list of things that made it past my usual delete-it filter - shipped, tested, and still running somewhere.

About / 02

The short version.

I'm a cybersecurity undergraduate at the University of Arizona, studying Cyber Operations with a CS minor. I spend most of my time inside other people's systems - legally - and the rest writing Python to make that work less tedious.

Past lives include a Junior SOC Analyst role at CyberEyeAW, a Cyber Intelligence internship at CogMac in New Delhi, and most recently a Cybersecurity Fellowship with Handshake AI evaluating LLM outputs on offensive-security prompts.

Outside of work I read too much about threat actor kill-chains and pretend I'll one day finish learning Rust.

  • NowUG Research Assistant · University of Arizona
  • WritingCritique-based eval framework for LLM-generated code
  • StackPython · Semgrep · Bandit · YARA · Ghidra · Volatility
  • CertseJPT · ICCA · Security+ (in progress)
Experience

A timeline of paid curiosity.

  1. 2026 - Now

    UG Cybersecurity Research Assistant

    University of Arizona · Tucson, AZ

    Designing a critique-based evaluation framework for LLM-generated code against OWASP Top 10. Building a Python pipeline that combines static analysis, rule-based scanning (Semgrep/Bandit), and LLM reasoning.

  2. 2025 - Now

    Cybersecurity Fellow

    Handshake AI · San Francisco, CA

    Auditing prompt-response pairs and evaluating LLM outputs on cybersecurity-focused projects. Designing domain-specific prompts to improve correctness and alignment.

  3. May - Aug 2025

    Jr. Security Operations Analyst

    CyberEyeAW · Sierra Vista, AZ

    Triaged 100+ weekly security incidents with a 99% resolution rate. Ran vulnerability assessments that reduced exposure by 70%. Collaborated with SOC teams on ThreatLocker tuning - cutting response time 30%.

  4. May - Aug 2024

    Cyber Intelligence Intern

    CogMac · New Delhi, India

    Investigated 50+ risks in hardware and financial systems, helping cut response time by 30%. Documented 25+ adversary TTPs via OSINT - playbooks adopted by 7 teams. Automated data pipelines that saved ~40 hrs/month.

Skills / 03

Working toolbox.

01

Offensive

Penetration testing, red teaming, vulnerability research, exploit development, reverse engineering.

  • Burp Suite
  • Metasploit
  • Nmap
  • Nessus
  • Ghidra
  • John
  • Hashcat
02

Defensive

SOC operations, incident response, threat hunting, SIEM tuning, forensic triage.

  • Splunk
  • Wireshark
  • Snort
  • ThreatLocker
  • YARA
  • Volatility
03

Languages

Python-first. Comfortable low-level when required, plus the web languages for building tools around findings.

  • Python
  • Java
  • C
  • JavaScript
  • Bash
  • PowerShell
  • SQL
04

Frameworks

Mapping work to standards the rest of the org actually cares about.

  • MITRE ATT&CK
  • NIST CSF
  • OWASP Top 10
  • ISO 27001
  • CIS Controls
05

Infra & Cloud

Lab and prod environments across hypervisors and cloud providers.

  • AWS
  • Azure
  • Docker
  • Linux
  • Active Directory
  • VMware
06

Analysis

Turning raw telemetry and malware into actionable intel.

  • Static & dynamic analysis
  • Packet inspection
  • OSINT
  • Threat modeling
Contact / 04

Let's build something worth breaking.

ashishdevchoudhary13@gmail.com