During an epic gaming session in the hot, muggy Indian nights of my engineering days, I pulled off some of the most amazing jump shots my teammates had ever seen in Counter-Strike. Against all odds, I landed these leaps perfectly, and my teammates started calling me “Frog” for my jumping skills.
The name stuck, but it also held a playful connection to a family joke my mom used to make about me “jumping from one thing to another,” especially during study sessions. Over time, ‘Frogy’ became a badge of honor, symbolizing my dynamic energy, both in gaming and later in cybersecurity.
π§βπ» Who am I?
Cybersecurity professional with 13 years of experience, excelling in vulnerability management, threat intelligence, penetration testing, and attack surface management. I’ve worked with diverse clients across the globe, from small consulting firms to large retail organizations. Proud holder of a Masterβs in Cybersecurity and multiple industry certifications.
π Core Competences
Risk-Based Vulnerability Management
Penetration Testing & Red Teaming
Attack Surface Management
Cyber Threat Intelligence
Detection Engineering (SIEM/Threat Hunting)
π» Technical Skills
Languages : Bash/Unix Shell, Rubber Ducky Script, HTML, MySQL, YAML
Methodologies : OWASP Top 10, NIST, OSSTM, MITRE ATT&CK Framework