BhawishyaKhanal
.01

ABOUT

PERSONAL DETAILS
44600 Kathmandu, Nepal
bhawishyakhanal "@" gmail.com
+977 9826151103
Hello. I am a Security Researcher Penetration Tester Bug Hunter Learner
I am Passionate About Cyber Security and Bug Hunting
Welcome To My Personal Profile
Available as Freelancer

BIO

ABOUT ME

I am a cybersecurity practitioner, I specialize in Vulnerability Assessment and Penetration Testing (VAPT) with a strong focus on cybersecurity. My expertise extends to Bash Scripting, PaloAlto firewall management, and Active Directory administration, ensuring robust network security. Proficient in ACL management and conducting internal IS audits, I have a track record of developing effective Security Awareness Programs.
Alongside my practical skills, I hold a Bachelor of Science degree in Computer Science and Information Technology. This educational foundation enhances my ability to address complex challenges in the cybersecurity landscape, reflecting my commitment to excellence in securing IT environments. With a proactive attitude, strong communication, and problem-solving skills, I am dedicated to continuous learning, ensuring a resilient and secure IT infrastructure.

HOBBIES

INTERESTS

Cybersecurity Research & Experimentation: I enjoy exploring the latest developments in the cybersecurity industry, researching new vulnerabilities, testing application features, experimenting with security tools, and automating security processes.

Traveling: I love being immersed in nature as a way to escape the bustling city life. I enjoy discovering new destinations and exploring the Himalayas and surrounding hills. I admire the beauty of nature, especially the greenery and aerial views of natural landscapes and cities.

Listening to Music: I enjoy exploring diverse music genres, discovering new artists, valuing unique compositions, and experiencing both the emotional depth of melodies and the overall vibe of the music.

Playing Games: I enjoy playing both real and online games in my free time, especially those involving specific tasks or challenges that require problem-solving. Overcoming these challenges helps me feel relaxed and cultivates a never-give-up attitude.

FACTS

NUMBERS ABOUT ME

920
CUPS OF COFFEE
7
PROJECTS COMPLETED
3996+
HOURS OF RESEARCH
3
WORKSHOPS
36+
VULNERABILITY
3
SATISFIED CUSTOMERS

.02

RESUME

  • EDUCATION
  • 2022
    2018
    Kathmandu, Nepal

    Bachelor of Science in Computer Science and Information Technology (BSc. CSIT)

    TRIBHUVAN UNIVERSITY

    Completed Bachelor Degree from National College of Computer Studies (NCCS). 126 Credit Hours. 41 Subjects. 5 Elective Subjects and an Internship Program.
  • 2018
    2016
    Kathmandu, Nepal

    +2 SCIENCE

    NATIONAL EXAMINATION BOARD

    Completed +2 from St.Lawrence College. Computer Science as Elective.
  • 2015
    2015
    Lamjung, Nepal

    SLC

    GOVERNMENT OF NEPAL

    Completed Secondary Level Education From Bhakti Namuna Higher Secondary School.
  • JOBS AND EXPERIENCE
  • 2024
    2023
    Kathmandu, Nepal

    Asst. System Security Engineer

    Vianet Communication Ltd.

    ▪ VAPT
    ▪ Active Directory
    ▪ Palo Alto Networks
    ▪ Log Processing
    ▪ ACL Management
    ▪ Linux
    ▪ Bash Scripting
    ▪ Configuration of Linux servers.
    ▪ VMware ESXi
  • 2023
    2023
    Kathmandu, Nepal

    Security Engineer - Internship

    Vianet Communication Ltd.

    ▪ Vulnerability Assesment
    ▪ Log Processing
    ▪ ACL Management
    ▪ Linux
    ▪ Bash Scripting
  • 2022
    2022
    Kathmandu, Nepal

    Ethical Hacker

    Alpha Box - Information Technology Company

    ▪ Metasploit
    ▪ Burp Suite, Wireshark, SQLmap, Fierce, OSINT
    ▪ Linux tools: auditd, OpenVAS
.03

SKILLS

APPLICATION PENETRATION TESTING
I have experience identifying vulnerabilities within applications using various penetration testing methodologies. I am proficient in analyzing application security weaknesses, ethically exploiting potential flaws, and recommending effective remediation measures. Additionally, I am well-versed in security assessment techniques to ensure a comprehensive evaluation of application defenses.
70%
LEVEL : INTERMEDIATEEXPERIENCE : 2 YEARS
MetasploitBurp SuiteWireshark
LINUX SECURITY
Proficient in using Linux security auditing and vulnerability scanning tools to monitor and secure systems. Skilled in analyzing audit logs and managing security configurations.
50%
LEVEL : INTERMEDIATEEXPERIENCE : 2 YEARS
auditdOpenVAS
SECURITY AUTOMATION
Experienced in automating security tasks to improve efficiency and reduce manual workload, including vulnerability scanning and reporting.
60%
LEVEL : INTERMEDIATEEXPERIENCE : 2 YEARS
Python scriptingBash scriptingsecurity tool integration
INCIDENT RESPONSE & HANDLING
Experienced in identifying, managing, and mitigating security incidents to minimize impact and restore normal operations efficiently. Skilled in conducting root cause analysis and preparing incident reports.
65%
LEVEL : INTERMEDIATEEXPERIENCE : 2 YEARS
SIEMLog analysis
.04

WORKS

img11
PENETRATION TESTING

WEB APPLICATION PENETRATION TESTING

img

WEB APPLICATION PENETRATION TESTING

I conduct comprehensive security assessments of web applications to identify vulnerabilities and weaknesses. This involves testing for common threats such as SQL injection, cross-site scripting (XSS), authentication flaws, and insecure configurations. Using tools like Burp Suite and SQLmap, I simulate real-world attacks to evaluate the application's resilience.

After identifying risks, I provide detailed reports with recommendations to strengthen the security posture and protect sensitive data from unauthorized access.

img11
Linux Security

Linux System Security

img

Linux System Security

I specialize in securing Linux-based systems through vulnerability assessments, configuration audits, and continuous monitoring. Using tools such as auditd and OpenVAS, I analyze system logs, detect unauthorized activities, and identify security gaps.

My approach includes hardening system settings, managing user permissions, and implementing best practices to protect against attacks and ensure system integrity and availability.

img11
AUTOMATION

SECURITY AUTOMATION

img

SECURITY AUTOMATION

I focus on automating security processes to enhance efficiency and reduce manual effort. This includes developing scripts in Python and Bash to automate vulnerability scanning, log analysis, and incident response tasks.

I develop and implement automated solutions to streamline security tasks such as vulnerability scanning, log analysis, and incident response. By using scripting languages like Python and integrating various security tools, I enhance efficiency, reduce manual workload, and improve the accuracy of security monitoring. Automation enables faster detection and mitigation of threats, strengthening overall system defense.

img11
Incident

INCIDENT RESPONSE & DIGITAL FORENSIC

img

INCIDENT RESPONSE & DIGITAL FORENSIC

I specialize in incident response and digital forensics, focusing on identifying, managing, and mitigating security incidents. I analyze system logs, conduct root cause analysis, and prepare detailed incident reports to enhance future security measures.

I manage and respond to security incidents by quickly identifying, containing, and mitigating threats to minimize damage. I conduct detailed digital forensic investigations to analyze compromised systems, collect evidence, and determine the root cause of security breaches. This process supports effective recovery and helps prevent future incidents by implementing corrective measures based on findings.

img11
AWARENESS

SECURITY AWARENESS PROGRAM

img

SECURITY AWARENESS PROGRAM

Creating a strong security culture within an organization is essential to defend against evolving cyber threats. Educating users about potential risks and safe practices empowers them to act as the first line of defense.

I design and deliver security awareness programs aimed at educating employees and stakeholders about cybersecurity best practices. These programs cover topics such as phishing prevention, password management, social engineering, and safe internet usage. By promoting a security-conscious culture, I help organizations reduce human-related risks and strengthen their overall security posture.

img11
COMPLIANCE & RISK

SECURITY COMPLIANCE & RISK MANAGEMENT

img

SECURITY COMPLIANCE & RISK MANAGEMENT

Maintaining compliance with security regulations and managing risks effectively are crucial for protecting organizational assets and ensuring business continuity. A structured approach to compliance and risk management helps organizations stay ahead of evolving threats and legal requirements.

I ensure that organizations adhere to relevant security standards and regulatory requirements by conducting compliance assessments and audits. Through identifying and evaluating risks, I help implement appropriate controls and policies to mitigate potential threats. This process supports maintaining legal obligations and enhancing the overall security posture.

.05

CONTACT

Get in touch


We are waiting to assist you
Simply use the form below to get in touch