Aditya Kore

Aditya Kore

Specializing in software development, vulnerability assessment, and cloud.
Reply rate:
-
Availability:
Full-time (40 hrs/wk)
Location:
Mumbai, Maharashtra, India
Experience:
1 year
ADITYA KORE - | Mumbai, India |-| linkedin.com/in/koreaditya | GitHub | LeetCode SUMMARY Software Engineer with 1+ year of experience in Python development, cloud platforms (AWS, Azure), and cybersecurity. Strong foundation in OOP, DSA, and agile workflows. Skilled in building secure, scalable full-stack and distributed systems. EDUCATION Master of Science in Cybersecurity Privacy & Trust, The University of Edinburgh Aug 2023 - Aug 2024 • Courses: Secure Programming, SDLC, Security Engineering, Cloud Programming, Usable Security • Graduated with a distinction, wrote papers on ‘Using AI to make IoT devices secure’, and ‘CVE report on Log4j’ • Master’s Thesis on ‘Process of Bug Bounty Hunting and Pen testing’ involving bug detection and reporting. Bachelor of Technology in Information Technology, KJSCE, Mumbai University June 2019 – June 2023 • Courses: Computer Networks, Python, Data Structures & Algorithms, Cloud Computing, Operating Systems, Web Dev, DBMS. SKILLS AND CERTIFICATIONS • • • • • Programming Languages: Python, JavaScript, SQL, Bash, Shell, HTML, PHP, Flutter, Assembly Cloud: Amazon AWS (Certified Solutions Architect Associate), Microsoft Azure (AZ-900), Oracle Cloud (OCI Associate) Frameworks & Tools: Docker, Git, Postman, Android Studio, Linux, Shell Scripting, CI/CD, REST APIs Software Engineering: Object-Oriented Programming, Data Structures & Algorithms, Agile Development, Full-Stack Dev DevSecOps: Secure Coding, Pen Testing, Digital Forensics, SIEM, Vulnerability Assessment, CEH v12, Pentest+, Security+ EXPERIENCE Security Operations Associate (Trainee to Full-time) June 2024 - Jan 2025 G4S Edinburgh, United Kingdom • Improved input validation in authentication and ticketing systems, enhancing security and reducing errors by 30%. • Collaborated on troubleshooting authentication workflows, increasing system uptime and reliability by 20%. • Conducted root cause analysis and proposed automation steps to reduce manual diagnostics and improve efficiency. • Supported high-traffic system resilience by optimizing event device performance and structured incident documentation. Cyber Security Analyst (Intern to Full-time) June 2022 - June 2023 DeepCytes Mumbai, India • Developed and executed simulated cyber-attacks to test infrastructure resilience, reducing critical vulnerabilities by 40%. • Built secure Windows server environments on cloud integrating SIEM, IDS/IPS, and honeypots for real-time threat detection. • Co-developed applications and led cloud simulations and VM setups on AWS/Azure, improving testing efficiency by 25%. • Authored malware analysis reports (e.g., Goldoson) and documented exploit chains using OSINT/VAPT tools like Burp Suite. • Organized Capture The Flag (CTF) and a large-scale cybersecurity drill for clients in Singapore as part of the technical team. Web Development Intern Aug 2021 – Nov 2021 KGE Technologies Mumbai, India • Developed full-stack web applications using HTML, CSS, JavaScript, PHP, and MySQL with RESTful API integration. • Performed code reviews, collaborated in Agile teams, using Git and SDLC best practices for version control and deployment. Machine Learning Intern Oct 2020 – Jan 2021 KJSCE Mumbai, India • Co-developed a Python-based machine learning model to categorize website URLs by scraping and classifying textual content. • Built a web interface to allow users to input URLs and view classification confidence scores using Flask and scikit-learn. PROJECTS DomainMiner (June 2024 – Aug. 2024): Designed and built a subdomain enumeration tool in Python to automate discovery in bug bounty workflows. Improved scanning performance and DNS querying and robust error handling, saving enumeration time. Dark Web Crawler: Co-developed a scalable crawler to systematically extract and analyze content from both surface and dark web. Engineered modular scraping pipelines and integrated NLP techniques to classify cybersecurity-related content. Vulnerability Assessment: Conducted a vulnerability assessment of systems in the university’s Cyber Lab using Nmap, Nessus. Dark Web Data Breach Investigation (Nov 2022 – Jan 2023): Used OSINT tools to trace leaked credentials and breach metadata. Generated a detailed breach report that included forensic insights, IOCs, and vulnerability analysis. Research Publication – ’Dark Web Crawling for Cyber Security’: Published a research paper exploring automation in cyber threat intelligence collection, ransomware discussion trends, and exploitation patterns using custom-built crawling infrastructure.
Get your freelancer profile up and running. View the step by step guide to set up a freelancer profile so you can land your dream job.