Available for freelance / remote • Security-first mindset

Network Engineer + Cybersecurity + IT Admin
Bug Bounty Hunter

I build and secure networks, harden systems, automate ops, and approach security with an attacker mindset — responsibly.

24/7
Monitoring mindset
Zero
Trust (Zero Trust approach)
Fast
Incident response
~/portfolio

$ whoami
amit0hx

$ focus --areas
networking
cybersecurity
it-admin
bug-bounty

$ current_stack
firewalls • vpn • segmentation • hardening
linux/windows • automation • logging • monitoring

$ note
Responsible disclosure only.
          

About

I’m a security-focused Network Engineer / IT Admin who loves building reliable infrastructure and testing it like an attacker. I work on secure network design, system hardening, monitoring, and vulnerability research.

What I do

  • Network design, segmentation (VLAN), VPN, firewall policies
  • System hardening, patching, access control, backups
  • Security testing (recon, OWASP top risks), reporting
  • Monitoring/logging & incident response readiness

How I work

  • Documentation-first + repeatable configs
  • Automation where possible (scripts, tooling)
  • Security + reliability together (not afterthought)
  • Clear reporting with actionable fixes

Open to

  • Network/Security Engineer roles
  • IT Administrator / Security Analyst roles
  • Freelance hardening, audits, monitoring setup
  • Bug bounty collaborations (responsible only)

Skills

Networking

Routing/SwitchingVLANSubnettingVPN Firewall RulesNATDNSDHCP

Cybersecurity

OWASPReconVuln AssessmentHardening Threat ModelingBurp SuiteNmapWireshark

IT Administration

LinuxWindowsUsers & PermissionsBackup PatchingMonitoringLog Management

Automation

BashPythonGitCI basics Config documentation

Projects

Replace these with your real labs/projects. I can rewrite them with your actual details.

Home Lab SOC (Wazuh / SIEM)

Built a small SOC-style monitoring lab for endpoint + log correlation and alerting.

  • Log collection & alert tuning
  • Basic incident workflow notes
  • Dashboard + detection rules (starter)

Network Segmentation & Firewall Policy Lab

Designed VLAN segmentation and enforced least-privilege rules between zones.

  • Guest / User / Server zone separation
  • Rules review checklist
  • Validation via packet captures

Web Security Practice (OWASP)

Hands-on testing: auth checks, input validation, misconfigurations, and reporting format.

  • Repro steps + impact + fix guidance
  • Basic payload testing (responsible)
  • Security headers review

Bug Bounty / Responsible Disclosure

What you’ll find here

  • Only public writeups / sanitized reports
  • No sensitive data, no exploit code for live targets
  • Focus on learning + secure remediation

Profiles

Tip: Agar aapke paas Hall of Fame ya disclosed reports hain, links add kar do.

Contact