Skip to content
View Bhaskar-Soni's full-sized avatar

Block or report Bhaskar-Soni

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Bhaskar-Soni/README.md

Hi 👋, I'm Bhaskar Soni

CEH v13 | AWS CSA | AZ-104 | RHCSA | CNSP | CC | TCM-SEC’s PEH | CCIO | ICOSA | CPEW

Digital Footprints

LinkedIn GitHub Twitter Hackonology


🚀 About Me:
  • 😎 Passionate about Cyber Security from India
  • 💼 Currently serving as a Security Expert at CenCops - Chandigarh Police.
  • 🎓 Pursuing Masters Degree in Cyber Security[MSc CS] from Nation Forensic Sciences University[NFSU].
  • 🎓 Holds a Bachelor's degree in Computer Applications[BCA] from Jaipur National University[JNU].
  • 🛡️ Specializes in: Linux, Cloud Computing, Networking, OSINT, Infra-Security, Web-APP Security and DevSecOps.
  • 🎮 Active member of the Hacking community Hackonology
  • 📝 Shares insights and knowledge through publications on YoungsterCompany

🛠️ Skills:
  • Languages:

    Python Shell Script Streamlit

  • OS:

    Linux macOS Windows

  • Cloud:

    Amazon AWS

  • Database:

    MySQL

  • DevOps:

    Jenkins GitHub Docker Ansible zabbix Splunk

    SonarQube git Jfrog maven redis kubernetes

    snort tomcat nginx firewall

  • IDE:

    VS Code

  • Site Management:

    wordpress cpanel

  • Virtualization:

    VMware

  • Other Tools:

    NMAP Wireshark burp zap


🕵️ Cyber Security Skills:
  • 🛡️ Server/System Security
  • 👨‍💻 Network Security
  • 🐳 DevOps: Docker and Docker Security
  • 🛠️ Dev-Sec-Ops: CI/CD Integration
  • 🤖 Scripting Automation (Shell Scripting and Python)
  • 🔐 Audit & Patching
  • 🔍 Penetration Testing
  • 🛡️ Vulnerability Assessment
  • 💻 Web and Network Penetration Testing
  • ☣️ Malware Analysis

🗂️ Projects:

AWS Chatbot: Spearheaded the development of an AWS Chatbot solution incorporating robust security measures and dynamic task execution, including real-time vulnerability detection and internal audit report generation. This initiative aimed at enhancing AWS resource management and fortifying security postures across EC2, IAM, and S3 services.

  • Technology used: Python, Streamlit, Boto3, Gemini API, AWS, LLM Text Classification Model

Kuberenetes Security: Implemented comprehensive security measures in Kubernetes, effectively addressing OWASP Top 10 vulnerabilities and enhancing Threat Management. Conducted Investigation and collected critical evidence to mitigate risks to ensure a secure Kubernetes.

  • Technology used: Kubernetes, Docker, Linux, AWS, Kubernetes Security Tools

🎨 Hobbies:
  • 🎮 Gaming
  • 🎧 Listening to Musi
  • 📷 photography
  • ✈️ travelling

Popular repositories Loading

  1. Password-Inspector Password-Inspector Public

    Password Inspector is a security-focused tool designed to analyze and evaluate the strength of user passwords. It helps identify weak, predictable, or vulnerable passwords by applying validation ru…

    Python

  2. linux_admin linux_admin Public

    Shell

  3. AWS_Chatbot AWS_Chatbot Public

    AWS Chatbot is an AI-powered cloud management assistant designed to simplify and automate interactions with Amazon Web Services (AWS). This project integrates advanced conversational AI capabilitie…

    Python

  4. Bhaskar-Soni Bhaskar-Soni Public

    My personal repository.

  5. shell-ai shell-ai Public

    Shell-AI is an intelligent command-line assistant that combines the power of shell scripting with AI-driven capabilities to enhance productivity and system interaction. It allows users to execute c…

    Python

  6. LogSentry LogSentry Public

    LogSentry is a real-time log monitoring and security analysis tool designed to detect suspicious activities, system anomalies, and potential threats from log data. It continuously scans and process…

    JavaScript