Aviral Sharma
@aviralsharma
Focused Red Team Analyst with expertise in offensive security.
What I'm looking for
I am a focused and execution-driven Red Team Analyst with real-world offensive and defensive experience. My specialization lies in adversary emulation, SIEM integration, custom dashboards, and threat detection. I am adept in Python scripting and the ELK stack, and I strive to strengthen organizational cyber posture through hands-on red teaming and engineering solutions.
During my internship at CyArt Tech LLP, I led the development of a full-scale offensive operations dashboard using React.js and Flask. I integrated WebSocket communication for real-time event updates during simulations and mapped MITRE ATT&CK techniques from simulated attacks. My work involved simulating live attacks and producing comprehensive red team reports with mitigation strategies, enhancing the cybersecurity readiness of the organization.
In my ongoing personal project, I am setting up a security monitoring lab on a Fedora workstation, tuning Suricata rules, and employing custom Python scripts for alert triggering. I am committed to countering attacks live and mitigating attack surfaces effectively, ensuring precision and timely responses in the ever-evolving landscape of cybersecurity.
Experience
Work history, roles, and key accomplishments
Red Team Lead Intern
CyArt Tech LLP
May 2025 - Present (1 month)
Built a full-scale offensive operations dashboard using React.js and Flask, integrating WebSocket communication for real-time event updates during simulations. Mapped MITRE ATT&CK techniques from simulated attacks and log responses, while also simulating live attacks using Nmap, SMB exploits, and SQLi tools on Docker-based vulnerable targets.
Cybersecurity Intern
CyArt Tech LLP
Jan 2025 - Present (5 months)
Designed and documented advanced threat simulation playbooks, producing awareness material for internal teams using real attack paths. Documented incident response patterns aligned to MITRE ATT&CK, enhancing readiness by 40%, and delivered documentation on incident chain analysis, including log evidence and response protocols.
Security Monitoring Setup on Fedora Workstation
Self-Employed
Configured Fedora as a hybrid attack and SIEM workstation, tuning Suricata rules and processing traffic logs to visualize detection gaps. Integrated Zabbix and Netdata for performance and behavior monitoring during attacks, employing custom Python scripts for alert triggering and system behavior logging.
Education
Degrees, certifications, and relevant coursework
Intellipaat
Diploma , Cybersecurity and Ethical Hacking
2024 - 2025
Grade: 9.6 CGPA
Activities and societies: Participated in cybersecurity competitions and workshops. Engaged in various projects related to offensive and defensive security.
Studied the fundamentals of computer science including programming languages, data structures, and algorithms. Focused on cybersecurity and network security.
Tech stack
Software and tools used professionally
Availability
Location
Authorized to work in
Website
github.com/LAVR-69Social media
Job categories
Interested in hiring Aviral?
You can contact Aviral and 90k+ other talented remote workers on Himalayas.
Message AviralFind your dream job
Sign up now and join over 85,000 remote workers who receive personalized job alerts, curated job matches, and more for free!
