ADITYA KORE
- | Mumbai, India |-| linkedin.com/in/koreaditya | GitHub | LeetCode
SUMMARY
Software Engineer with 1+ year of experience in Python development, cloud platforms (AWS, Azure), and cybersecurity. Strong
foundation in OOP, DSA, and agile workflows. Skilled in building secure, scalable full-stack and distributed systems.
EDUCATION
Master of Science in Cybersecurity Privacy & Trust, The University of Edinburgh
Aug 2023 - Aug 2024
• Courses: Secure Programming, SDLC, Security Engineering, Cloud Programming, Usable Security
• Graduated with a distinction, wrote papers on ‘Using AI to make IoT devices secure’, and ‘CVE report on Log4j’
• Master’s Thesis on ‘Process of Bug Bounty Hunting and Pen testing’ involving bug detection and reporting.
Bachelor of Technology in Information Technology, KJSCE, Mumbai University
June 2019 – June 2023
• Courses: Computer Networks, Python, Data Structures & Algorithms, Cloud Computing, Operating Systems, Web Dev, DBMS.
SKILLS AND CERTIFICATIONS
•
•
•
•
•
Programming Languages: Python, JavaScript, SQL, Bash, Shell, HTML, PHP, Flutter, Assembly
Cloud: Amazon AWS (Certified Solutions Architect Associate), Microsoft Azure (AZ-900), Oracle Cloud (OCI Associate)
Frameworks & Tools: Docker, Git, Postman, Android Studio, Linux, Shell Scripting, CI/CD, REST APIs
Software Engineering: Object-Oriented Programming, Data Structures & Algorithms, Agile Development, Full-Stack Dev
DevSecOps: Secure Coding, Pen Testing, Digital Forensics, SIEM, Vulnerability Assessment, CEH v12, Pentest+, Security+
EXPERIENCE
Security Operations Associate (Trainee to Full-time)
June 2024 - Jan 2025
G4S
Edinburgh, United Kingdom
• Improved input validation in authentication and ticketing systems, enhancing security and reducing errors by 30%.
• Collaborated on troubleshooting authentication workflows, increasing system uptime and reliability by 20%.
• Conducted root cause analysis and proposed automation steps to reduce manual diagnostics and improve efficiency.
• Supported high-traffic system resilience by optimizing event device performance and structured incident documentation.
Cyber Security Analyst (Intern to Full-time)
June 2022 - June 2023
DeepCytes
Mumbai, India
• Developed and executed simulated cyber-attacks to test infrastructure resilience, reducing critical vulnerabilities by 40%.
• Built secure Windows server environments on cloud integrating SIEM, IDS/IPS, and honeypots for real-time threat detection.
• Co-developed applications and led cloud simulations and VM setups on AWS/Azure, improving testing efficiency by 25%.
• Authored malware analysis reports (e.g., Goldoson) and documented exploit chains using OSINT/VAPT tools like Burp Suite.
• Organized Capture The Flag (CTF) and a large-scale cybersecurity drill for clients in Singapore as part of the technical team.
Web Development Intern
Aug 2021 – Nov 2021
KGE Technologies
Mumbai, India
• Developed full-stack web applications using HTML, CSS, JavaScript, PHP, and MySQL with RESTful API integration.
• Performed code reviews, collaborated in Agile teams, using Git and SDLC best practices for version control and deployment.
Machine Learning Intern
Oct 2020 – Jan 2021
KJSCE
Mumbai, India
• Co-developed a Python-based machine learning model to categorize website URLs by scraping and classifying textual content.
• Built a web interface to allow users to input URLs and view classification confidence scores using Flask and scikit-learn.
PROJECTS
DomainMiner (June 2024 – Aug. 2024): Designed and built a subdomain enumeration tool in Python to automate discovery
in bug bounty workflows. Improved scanning performance and DNS querying and robust error handling, saving enumeration time.
Dark Web Crawler: Co-developed a scalable crawler to systematically extract and analyze content from both surface and dark
web. Engineered modular scraping pipelines and integrated NLP techniques to classify cybersecurity-related content.
Vulnerability Assessment: Conducted a vulnerability assessment of systems in the university’s Cyber Lab using Nmap, Nessus.
Dark Web Data Breach Investigation (Nov 2022 – Jan 2023): Used OSINT tools to trace leaked credentials and breach
metadata. Generated a detailed breach report that included forensic insights, IOCs, and vulnerability analysis.
Research Publication – ’Dark Web Crawling for Cyber Security’: Published a research paper exploring automation in cyber
threat intelligence collection, ransomware discussion trends, and exploitation patterns using custom-built crawling infrastructure.