$ whoami

Vedant
Jadhav

Building secure systems.
Top 3% on TryHackMe

Who I Am

I'm a cybersecurity-focused engineering student with a systems-level mindset, interested in understanding how things break as much as how to build them. My approach is analytical first: model the threat, understand the surface, then act precisely.

I work primarily in Linux environments, scripting in Python, and approaching problems from a security-by-design perspective. Whether it's evaluating detection resistance of a covert channel or structuring data pipelines with validation integrity, I care about correctness under adversarial conditions.

My interest in cybersecurity isn't just defensive, I believe understanding offensive techniques is essential for building systems that hold up in practice, not just on paper.

Focus: Security engineering, threat modeling, covert channels, secure system design
Environment: Linux-primary, CLI-native, terminal-first workflow
Research: Steganography, network security, Python-based automation
Education: Electronics and Telecommunications Engineering

Selected Work

01 / steganography

Secure Communication Tool via LSB Steganography

Proof-of-concept covert communication channel using Least Significant Bit embedding. Encrypted payloads are hidden inside carrier images with statistically minimal distortion, making detection by naive steganalysis unreliable.

// security insight Combined AES-level encryption with LSB embedding — even if the image is intercepted, the embedded ciphertext reveals nothing without the key. Evaluated against histogram analysis and chi-square steganalysis attacks.
Python OpenCV Cryptography Pillow NumPy
02 / network security

Network Vulnerability Assessment Framework

Modular Python framework for automated network reconnaissance and vulnerability enumeration. Integrates with Nmap for host discovery and service fingerprinting, with structured JSON output for downstream analysis.

// security insight Focused on reducing false positives through service-version correlation — a common pain point in automated scanning that causes report noise and missed criticals.
Python Nmap Socket JSON Regex
03 / automation

Structured Web Scraping & Data Validation Pipeline

Automated data extraction pipeline handling anti-scraping mechanisms, dynamic content, and schema validation. Built with structured error handling and integrity checks to ensure clean dataset output at scale.

// security insight Demonstrated how many public-facing APIs expose internal data structures through inconsistent rate-limiting and schema leakage — a reconnaissance vector often underestimated in threat models.
Python BeautifulSoup Requests Pandas Pydantic

Credentials

Certified in Cybersecurity (CC)
ISC²
Fortinet Certified Fundamentals
Fortinet — Network Security
Google Cybersecurity Professional
Google — via Coursera
Introduction to Linux
Linux Foundation
API Security Fundamentals
APIsec University

Technical Proficiency

Operating Systems
Kali Linux
Ubuntu / Debian
Windows (WSL)
Arch Linux
Security Domains
Network Penetration Testing
Threat Modeling
Steganography & Covert Channels
Cryptographic Systems
API Security
OSINT & Reconnaissance
Tools & Libraries
Wireshark
Nmap / Zenmap
Metasploit Framework
Burp Suite
OpenCV
Volatility
Scripting Languages
Python 3.x
Bash / Shell Scripting
SQL
PowerShell (basic)
Networking Concepts
TCP/IP, UDP Protocol Stack
DNS, HTTP/S, SSH, FTP
Firewall & IDS/IPS Concepts
VPN & Tunneling
Packet Analysis
Development & Other
Git & Version Control
Docker (basic)
REST API Integration
Data Pipeline Automation
Report Writing & Documentation

Work & Internships

2024
Internship
Cyber Security Intern
IBM SkillsBuild — Edunet Foundation
  • Developed a secure communication proof-of-concept using LSB steganography for covert data embedding in image carriers
  • Implemented image-based payload embedding with OpenCV — evaluating distortion metrics and visual fidelity post-embed
  • Evaluated confidentiality guarantees and detection resistance against statistical steganalysis methods
  • Documented threat model and attack surface for the covert channel, including key management considerations
2023
Part-time
Data & Web Scraping Assistant
Idiating Tribe
  • Automated structured dataset extraction from public web sources using Python (BeautifulSoup, Requests)
  • Implemented validation and schema enforcement to ensure data integrity across extraction cycles
  • Reduced manual QA effort by ~60% through rule-based anomaly detection in scraped records
  • Identified and documented security patterns in target sites — rate limiting, schema inconsistencies, data leakage vectors

Get in Touch

Open to internships, research collaborations, and challenging problems in security engineering. Reach out directly, no recruiters.