Binary Mind — Secure File Sharing
A secure cloud file-sharing platform with AES-256 encryption, role-based access control, and activity logging. Built with modern security best practices for enterprise-grade protection.
BRIJESH PALTA — Cloud Security & DevSecOps Engineer
An aspiring DevSecOps & Cloud Security Engineer passionate about designing secure, scalable systems. Currently pursuing Master's in Cyber Security at Deakin University. Here, security is architected, threats are analyzed, and resilience is built. Not just a portfolio. A security laboratory.
┌───────────────────────┐ │ ███████╗███████╗ │ │ ██╔════╝██╔════╝ │ │ ███████╗█████╗ │ │ ╚════██║██╔══╝ │ │ ███████║███████╗ │ │ ╚══════╝╚══════╝ │ │ │ │ > threat level: low │ │ > status: secure │ └───────────────────────┘┌─────────────────────────────────────┐ │ │ │ ██████╗ ██████╗ ██████╗███████╗ │ │ ██╔════╝██╔═══██╗██╔════╝██╔════╝ │ │ ██║ ██║ ██║██║ ███████╗ │ │ ██║ ██║ ██║██║ ██╔════╝ │ │ ╚██████╗╚██████╔╝╚██████╗███████╗ │ │ ╚═════╝ ╚═════╝ ╚═════╝╚══════╝ │ │ Security │ │ │ │ > architecture loaded: yes │ │ > status: defending │ │ > threat model: analyzed │ │ │ └─────────────────────────────────────┘
Artifacts
A secure cloud file-sharing platform with AES-256 encryption, role-based access control, and activity logging. Built with modern security best practices for enterprise-grade protection.
Cross-platform task management application with Firebase Authentication and Firestore real-time synchronization. Built with Kotlin and Swift for iOS and Android.
VMware-based enterprise network simulation with Active Directory, Wazuh SIEM, Suricata IDS, and ELK Stack for detecting insider threats through behavioral anomaly analysis.
QR-based digital visiting card system with Firebase Authentication and Firestore backend. Enables secure, scalable digital identity sharing.
ML-driven intelligent recommendation system with data preprocessing, feature engineering, and regression models for personalized diet and workout plans.
Hands-on learning and research environment for AWS security, IAM policies, VPC configuration, and security group implementations.
Collection of network monitoring and analysis tools for threat detection, packet analysis, and network optimization using Wireshark and tcpdump.
Automated CI/CD security pipeline with GitHub Actions, SAST/DAST integration, and secure code review workflows for production deployments.
Field Notes
Hands-on learning experiences, security research, and technical investigations from the field.
Simulated smart home appliance security testing using a demo web interface. Hands-on experience with IoT vulnerability assessment and threat modeling.
Cloud security fundamentals and best practices. AWS security architecture, IAM policies, and defense-in-depth strategies.
Deep dive into authentication flows, input validation, access control vulnerabilities, and secure code review practices.
Enterprise network security, routing optimization, LAN/WAN deployments, and real-time threat monitoring with SIEM and IDS.
Work in Progress
Active security projects and research initiatives. Systems being secured, threats being analyzed, and defenses being strengthened.
Secure file-sharing platform with AES-256 encryption, RBAC, and activity logging
Enterprise SIEM with Wazuh, Suricata IDS, and behavioral anomaly detection
CI/CD security pipeline with SAST/DAST and automated vulnerability scanning
AWS security research and hardening lab with IAM, VPC, and KMS implementation