Background
Srachet Rai
Srachet Rai

Srachet Rai

Cybersecurity Enthusiast & BTech CSE

A passionate cybersecurity enthusiast and creative designer with a strong foundation in computer science. Experienced in penetration testing, vulnerability assessment, and secure coding practices.

Cybersecurity & Pentesting

Nessus Logo
Nessus

Nessus

A comprehensive vulnerability scanner used to identify security weaknesses, misconfigurations, and malware across network devices, servers, and applications.

Burp Suite Logo
Burp Suite

Burp Suite

An integrated platform for web application security testing, combining automated scanning with powerful manual tools for in-depth analysis and exploitation.

Metasploit Logo
Metasploit

Metasploit

A powerful penetration testing framework for developing, testing, and executing exploit code against remote targets to validate vulnerabilities.

Wireshark Logo
Wireshark

Wireshark

The world's foremost network protocol analyzer, allowing for deep inspection of network traffic to troubleshoot issues and investigate security incidents.

Wazuh Logo
Wazuh

Wazuh

An open-source security platform that unifies XDR and SIEM capabilities for threat detection, integrity monitoring, incident response, and compliance.

TheHive Logo
TheHive

TheHive

A scalable, open-source Security Incident Response Platform (SIRP) designed for security analysts to collaborate on investigations and streamline case management.

DFIR-IRIS Logo
DFIR-IRIS

DFIR-IRIS

An open-source platform for collaborative digital forensics and incident response, helping teams manage and investigate security cases efficiently.

MISP Logo
MISP

MISP

A Threat Intelligence Platform (TIP) for sharing, storing, and correlating Indicators of Compromise (IOCs) from cybersecurity threats.

Ghidra Logo
Ghidra

Ghidra

A suite of software reverse engineering tools developed by the NSA, used for analyzing malicious code and discovering software vulnerabilities.

Cuckoo Sandbox Logo
Cuckoo Sandbox

Cuckoo Sandbox

An open-source automated malware analysis system that detonates suspicious files in a controlled environment to observe their behavior.

SQLmap Logo
SQLmap

SQLmap

An open-source tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers.

x64dbg Logo
x64dbg

x64dbg

An open-source x64/x32 debugger for Windows, essential for reverse engineering and malware analysis on the Windows platform.

Cloud & DevOps

Microsoft Azure Logo
Microsoft Azure

Microsoft Azure

A comprehensive cloud platform offering a wide range of services for computing, networking, storage, and application deployment.

Docker Logo
Docker

Docker

A containerization platform used to build, ship, and run applications in isolated environments, ensuring consistency across development and production.

Jenkins Logo
Jenkins

Jenkins

An open-source automation server that enables developers to reliably build, test, and deploy their software through CI/CD pipelines.

Okta Logo
Okta (SSO)

Okta (SSO)

An enterprise-grade Identity and Access Management (IAM) service used to secure user access to applications with Single Sign-On.

CATO Networks Logo
CATO Networks

CATO Networks

A cloud-native Secure Access Service Edge (SASE) platform that converges networking and security into a single, unified service.

Podman Logo
Podman

Podman

A daemonless container engine for developing, managing, and running OCI Containers on Linux systems, often used as a secure alternative to Docker.

QEMU Logo
QEMU

QEMU

A generic and open-source machine emulator and virtualizer used for running operating systems for any machine on any supported architecture.

VirtualBox Logo
VirtualBox

VirtualBox

A powerful, cross-platform virtualization product for enterprise and home use, allowing users to run multiple operating systems simultaneously.

Languages & Development

Python Logo
Python

Python

A high-level, versatile language widely used for security scripting, task automation, data analysis, and backend web development.

JavaScript Logo
JavaScript

JavaScript

The core language of the web, enabling interactive and dynamic user experiences on the frontend.

TypeScript Logo
TypeScript

TypeScript

A statically typed superset of JavaScript that enhances code quality and maintainability in large-scale applications.

React Logo
React

React

A popular JavaScript library for building component-based, interactive user interfaces for single-page applications.

Node.js Logo
Node.js

Node.js

A JavaScript runtime built on Chrome's V8 engine, used for building fast and scalable backend services and APIs.

Express Logo
Express

Express

A minimal and flexible Node.js web application framework that provides a robust set of features for web and mobile applications.

Git Logo
Git

Git

A distributed version control system for tracking changes in source code during software development, enabling collaboration and history management.

GitHub Logo
GitHub

GitHub

A web-based platform for version control and collaboration, allowing developers to host and review code, manage projects, and build software.

MySQL Logo
MySQL

MySQL

A widely-used open-source relational database management system (RDBMS) known for its reliability, performance, and ease of use.

MongoDB Logo
MongoDB

MongoDB

A source-available, document-oriented NoSQL database program used for high-volume data storage and applications requiring flexible data models.

Platforms & Software

Figma Logo
Figma

Figma

A collaborative, web-based interface design tool used for creating, prototyping, and sharing UI/UX designs in real-time.

Blender Logo
Blender

Blender

A free and open-source 3D computer graphics software toolset used for creating animated films, visual effects, art, and 3D models.

Unreal Engine Logo
Unreal Engine

Unreal Engine

An advanced real-time 3D creation tool used for developing high-fidelity games, simulations, and immersive virtual experiences.

Adobe Photoshop Logo
Adobe Photoshop

Adobe Photoshop

The industry-standard raster graphics editor for digital art, photo editing, and image manipulation.

Adobe Illustrator Logo
Adobe Illustrator

Adobe Illustrator

A leading vector graphics editor and design program used to create logos, icons, illustrations, and typography.

Featured Projects

Wifi-CSI Based Activity Recognition
Wifi-CSI Based Activity Recognition
Developed a machine learning model using WiFi Channel State Information (CSI) to recognize human activities. The system processes CSI data to detect and classify different human movements with high accuracy.
Python
TensorFlow
NumPy
Pandas
TinyLinux
TinyLinux
Created a minimalist Linux distribution from scratch, focusing on security and performance. Implemented custom kernel configurations and security hardening measures.
C
Assembly
Linux
Shell

Role & Responsibilities

Technology Intern – Cyber Security

July 2025 – Present

Fluidech IT Services Private Limited

  • Undertaking internship focused on core cyber security operations, risk assessment, and secure software practices as part of Fluidech
  • Working on threat intelligence and security operations
  • Participating in vulnerability assessment and incident response activities
  • Gaining hands-on experience in OT security and reverse engineering techniques

Junior Web Designer

2023

Maa Karma Global Engineering LLP

  • Designed and developed web interfaces in a remote internship
  • Created responsive and user-friendly website layouts
  • Implemented modern UI/UX principles in design solutions
  • Developed responsive and accessible web solutions

Certifications

Certification Tracks & Learning Paths

Palo Alto Networks Certified Cybersecurity Practitioner
Palo Alto Networks • Completed 2024
6 Certifications

Comprehensive cybersecurity practitioner certification covering cloud security, endpoint security, network security fundamentals, and security operations.

Network security
Cloud security
Endpoint security
Security operations
Incident response
+1 more

Comprehensive cybersecurity practitioner certification covering cloud security, endpoint security, network security fundamentals, and security operations.

Network security
Cloud security
Endpoint security
Security operations
Incident response
Threat detection

Cloud Security Fundamentals

2024

Foundational knowledge of cloud security principles and best practices.

Cloud security principles
Cloud architecture
Security controls
+1
View

Cybersecurity Fundamentals

2024

Core cybersecurity concepts and threat landscape understanding.

Cybersecurity basics
Threat landscape
Security frameworks
+1
View

Endpoint Security

2024

Protection strategies for endpoints including detection and response techniques.

Endpoint protection
Malware detection
Incident response
+1
View

Network Security Fundamentals

2024

Network security principles, firewalls, and intrusion prevention systems.

Network security
Firewall management
IPS/IDS
+1
View

Security Operations Fundamentals

2024

Security operations center processes and incident management.

SOC operations
Incident management
Security monitoring
+1
View

Understanding Security Operations - Foundational

2024

Foundational understanding of security operations and best practices.

Security operations
Best practices
Process management
+1
View
Palo Alto Networks Certified Network Security Analyst
Palo Alto Networks • Completed 2024
4 Certifications

Advanced network security analyst certification focusing on PAN-OS, Panorama management, and security services.

PAN-OS administration
Panorama management
Traffic decryption
Log analysis
Security policy management

Advanced network security analyst certification focusing on PAN-OS, Panorama management, and security services.

PAN-OS administration
Panorama management
Traffic decryption
Log analysis
Security policy management

Decryption - Features

2024

Advanced traffic decryption and SSL inspection techniques.

SSL decryption
Traffic inspection
Certificate management
+1
View

PAN-OS

2024

Comprehensive PAN-OS administration and configuration.

PAN-OS administration
Firewall configuration
Policy management
+1
View

Panorama - Features

2024

Centralized management using Panorama for multiple firewalls.

Panorama management
Centralized policies
Device monitoring
+1
View

Strata Logging Service - Features

2024

Cloud-based logging and analysis service for enhanced security insights.

Cloud logging
Log analysis
Security insights
+1
View

Individual Certifications

ICS 300 (CISA)
CISA (Cybersecurity and Infrastructure Security Agency)2024

Advanced Industrial Control Systems security training focusing on comprehensive ICS security practices.

Advanced ICS security
Critical infrastructure protection
Security assessment
Risk management
Cato Certified Associate (CCA)
Cato NetworksJuly 22, 2025

Successfully completed the Cato Certified Associate (CCA) course, demonstrating foundational knowledge in secure network architecture, cloud security, and the Cato SASE platform.

Secure network architecture
Cloud security
SASE platform
Network fundamentals
Machine Learning
Indian Institute of Technology, Bombay2023

Comprehensive training in machine learning concepts and practical applications.

Machine learning fundamentals
Data analysis
Model training
Algorithm implementation

Achievements & Recognition

Design Core
TEDxNIITUniversity2024

Leadership and digital design expertise in TEDx event organization.

Digital design
Leadership
Event organization
Creative direction
Learners' Premier League - Best Researcher
NIIT University2023

Certificate of achievement presented as Best Researcher in Learners' Premier League 2022.

Research skills
Analytical thinking
Presentation skills
Team collaboration
English Tutoring for Job Training
NIIT Foundation2022

Certificate of Appreciation for volunteering efforts to provide tutoring for English for Job Training to NIIT Foundation students.

Tutoring
Communication skills
Mentoring
Volunteer work

Get in Touch

Feel free to reach out.