I'm Saumya Kumar, a cybersecurity professional and software developer based in Kanpur, India. Currently working as a Research Engineer at IIT Kanpur, I specialize in protecting digital infrastructure and guiding organizations toward robust security postures.
My expertise spans Governance, Risk & Compliance (GRC), Vulnerability Assessment & Penetration Testing (VAPT), Digital Forensics, and Cloud Security. I bridge the gap between offensive security knowledge and defensive strategy.
As a published researcher with papers in IJIRT and IJSDR on cloud security and cyber law, I bring both academic depth and hands-on technical skill to every engagement.
{ "name": "Saumya Kumar", "role": "Research Engineer", "org": "IIT Kanpur", "location": "Kanpur, India", "focus": [ "Cybersecurity", "Cloud Security", "GRC", "VAPT" ], "status": "Available for opportunities", "threat_level": "Defender" }
Certified Ethical Hacker
Mastery of offensive security techniques, footprinting, scanning, exploitation, and post-exploitation methodologies.
CompTIA Security+
Industry-standard certification covering threats, vulnerabilities, architecture, implementation, operations, and compliance.
Information Security Management
Certified in implementing and managing an information security management system aligned with international standards.
A steganography encryption tool that hides sensitive data within image files. Combines cryptographic techniques with image steganography for covert communication.
Scalable cloud log analytics pipeline processing 10M+ logs/day. Built on Kinesis Firehose, Apache Flink, and OpenSearch with real-time threat detection dashboards in Kibana.
Automated IT audit system streamlining the compliance audit process. Generates audit trails, risk assessments, and compliance reports aligned with ISO 27001 and NIST frameworks.
Self-hosted Network Attached Storage built on Raspberry Pi with OpenMediaVault. Secure, private cloud storage solution with SSH access and data encryption.
Published in the International Journal of Innovative Research in Technology. Explores emerging threats in cloud computing environments and proposes a layered defense framework for enterprise cloud deployments.
Read Paper →Published in the International Journal of Scientific Development and Research. Analyzes the intersection of cybersecurity practices and legal frameworks, covering jurisdiction challenges in cross-border cybercrime.
Read Paper →Open to cybersecurity roles, consulting engagements, and research collaborations.
The best way to reach me is directly via email.
or connect on