ANVEEKSH M. RAO
CEH · MS Cybersecurity @ Northeastern · CISO & Consultant · PhD-Track
bash — anveeksh@root — 80×24
root@kali:~$ cat about.txt
# MS Cybersecurity — Northeastern University (GPA 3.85 | May 2027)
name = "Anveeksh Mahesh Rao" # goes by ISH
location = "Boston, MA"
certs = ["CEH", "CompTIA Security+ (in-progress)"]
research = ["CACTi Lab (IoT/firmware)", "Cyber-Physical Risk"]
company = "Cyber Tech Associates (CISO, 30-person, 6 countries)"
papers = 2 # peer-reviewed & published
goal = "PhD → Tenure-track faculty → Independent research lab"
root@kali:~$
explore tools initiate contact
0
Team size @ Cyber Tech Associates
0
Countries of operation
0
Peer-reviewed publications
0
GPA points (3.85 / 4.0)
0
Open-source security tools built
02

skill_set.json

Offensive Security
Penetration Testing92%
VAPT / Bug Bounty88%
Exploit Development75%
CTF / Reverse Eng.82%
Research & IoT
Firmware Fuzzing80%
IoT Vulnerability Research84%
OT/ICS Security72%
Medical Device Sec.70%
GRC & Compliance
Risk Assessment90%
NIST / ISO 2700185%
AI/ML Compliance78%
Cyber-Physical Risk82%
Engineering & Dev
Python / Bash90%
ML / AI Security82%
Wazuh / SIEM80%
Docker / Flask76%
03

ls ~/tools/

Offensive
PIKOPET v2.0
AI-powered cross-platform penetration testing assistant using Ollama local LLM inference. Natural language attack planning, automated recon, and exploit suggestion pipeline.
PythonOllamaLLMPentest
Detection
PhishGuard Pro v2.0
Flask SIEM-style phishing detection dashboard. ML ensemble (Random Forest + XGBoost + Neural Net), 99.5% accuracy, real-time email/QR/batch scanning. Research paper published.
FlaskXGBoostRFPyTorch
Offensive
NetPwn
Network pentesting framework with integrated Flask dashboard. Automated service enumeration, CVE correlation, and attack surface visualization.
PythonNmapFlaskCVE
OSINT
TraceHunt
OSINT people-search CLI tool for passive reconnaissance. Aggregates public data sources with structured profiling output and operator-safe logging.
PythonOSINTCLIRecon
Defense
HoneyTrap Lab
Production-grade Cowrie SSH honeypot with real attacker capture, MITRE ATT&CK TTP mapping, and Wazuh integration for automated alerting.
CowrieWazuhATT&CKELK
ML/AI
Attack Path Predictor
Graph theory + ML model that predicts lateral movement paths in enterprise networks. Node embeddings encode vulnerability metadata; path scoring via GNN.
NetworkXGNNPythonGraph ML
Offensive
ShadowScan
Offensive security CLI toolkit for automated subdomain enumeration, port scanning, and credential auditing with modular plugin architecture.
PythonCLIReconPlugins
GRC
AI-Integrated GRC Platform
End-to-end governance, risk & compliance platform with LLM-powered policy generation, gap analysis, and compliance scoring against NIST, ISO 27001.
LLMNISTISO 27001Flask
04

cat history.log

Research Assistant
2025 – Present
CACTi Lab · Northeastern University · Prof. Ziming Zhao
  • Firmware fuzzing and IoT vulnerability research on embedded devices
  • Medical device security assessment and responsible disclosure pipeline
  • Cyber-physical risk modeling under Prof. Papageorge
CISO & Cybersecurity Consultant
Jan 2024 – Sep 2025
Cyber Tech Associates · 30-person firm · 6 countries
  • Co-founded and scaled cybersecurity consulting firm across 6 countries
  • Trained thousands of students globally in offensive/defensive security
  • Led VAPT engagements, GRC advisory, and incident response operations
Cyber Security Engineer
2023 – 2024
Mentorbot LLP · Techproxima Dubai · Agamya Cyber Tech
  • Penetration testing, VAPT, and security assessments across client environments
  • Developed internal tooling for automated vulnerability discovery
  • Security consulting in Dubai and India-based technology firms
B.Tech · Cyber Security & Cyber Forensics
2020 – 2024
Srinivas University · CGPA 8.34
  • Published 2 peer-reviewed research papers in cybersecurity domain
  • Specialized in digital forensics, network security, and cryptography
05

grep -r research/ .

06

./contact.sh

contact_info.json
phone (617) 840-8538
location Boston, MA
edu Northeastern University · Khoury College
status ● OPEN TO OPPORTUNITIES
focus Offensive Sec · GRC · OT/ICS · Research
quick_connect.sh
$ echo "Looking for internship / research collab?"
# Reach out. I respond fast.

areas = [
"Offensive Security Intern",
"GRC / AI Compliance Analyst",
"OT/ICS Security Research",
"Research Collaborations"
]

$
ISH@ROOT · BOSTON, MA · STATUS: ONLINE CEH · SECURITY+[IN PROGRESS] · MS CYBERSECURITY — NEU 2027