saumya@portfolio: ~ [ type help to see all commands ]
root@saumya:~$ 
01

whoami

I'm Saumya Kumar, a cybersecurity professional and software developer based in Kanpur, India. Currently working as a Research Engineer at IIT Kanpur, I specialize in protecting digital infrastructure and guiding organizations toward robust security postures.

My expertise spans Governance, Risk & Compliance (GRC), Vulnerability Assessment & Penetration Testing (VAPT), Digital Forensics, and Cloud Security. I bridge the gap between offensive security knowledge and defensive strategy.

As a published researcher with papers in IJIRT and IJSDR on cloud security and cyber law, I bring both academic depth and hands-on technical skill to every engagement.

profile.json
{
  "name": "Saumya Kumar",
  "role": "Research Engineer",
  "org": "IIT Kanpur",
  "location": "Kanpur, India",
  "focus": [
    "Cybersecurity",
    "Cloud Security",
    "GRC",
    "VAPT"
  ],
  "status": "Available for opportunities",
  "threat_level": "Defender"
}
02

skill_matrix

Offensive Security

VAPT
88%
Phishing Simulation
82%
OSINT
85%
Digital Forensics
80%

🛡 Governance & Compliance

ISO 27001
90%
NIST CSF
85%
CIS Controls
82%
IT Audit
78%

Cloud & Infrastructure

AWS
85%
Linux
88%
Raspberry Pi / NAS
75%
OpenSearch / Kibana
78%

</> Development

Python
90%
JavaScript
80%
Flask / Django
78%
Bash Scripting
82%
03

certifications

EC-Council

CEH v12

Certified Ethical Hacker

Mastery of offensive security techniques, footprinting, scanning, exploitation, and post-exploitation methodologies.

Ethical HackingExploitationRecon
📋
ISO

ISO 27001

Information Security Management

Certified in implementing and managing an information security management system aligned with international standards.

ISMSGRCAudit
04

projects

SECURITY TOOL

Stega Secure

A steganography encryption tool that hides sensitive data within image files. Combines cryptographic techniques with image steganography for covert communication.

PythonCryptographySteganographyPillow
GRC / AUDIT

AUditRite

Automated IT audit system streamlining the compliance audit process. Generates audit trails, risk assessments, and compliance reports aligned with ISO 27001 and NIST frameworks.

PythonDjangoISO 27001NIST
HARDWARE

PiNAS

Self-hosted Network Attached Storage built on Raspberry Pi with OpenMediaVault. Secure, private cloud storage solution with SSH access and data encryption.

Raspberry PiOpenMediaVaultLinuxSSH
05

research

IJIRT Peer-Reviewed

Research Paper on Cloud Security

Published in the International Journal of Innovative Research in Technology. Explores emerging threats in cloud computing environments and proposes a layered defense framework for enterprise cloud deployments.

Cloud SecurityAWSThreat Modeling
Read Paper →
IJSDR Peer-Reviewed

Research Paper on Cyber Law

Published in the International Journal of Scientific Development and Research. Analyzes the intersection of cybersecurity practices and legal frameworks, covering jurisdiction challenges in cross-border cybercrime.

Cyber LawComplianceJurisdiction
Read Paper →
06

contact

Open to cybersecurity roles, consulting engagements, and research collaborations.
The best way to reach me is directly via email.

saumyakumar8935@gmail.com

or connect on