auto_fix_high
Inscribing wards…
verified Level 99 Caster · Cyber-Sorcery Apprentice
Hogwarts School · Codex MMXXVI

Wand & Wireshark
A Witch's Working
Codex of Cyber-Sorcery Devadhashiny · S · P

CYBER SECURITY · BE CSE · 2022 – 2026

Devadhashiny S P

Aspiring cybersecurity engineer focused on threat intelligence, IoT security, and web penetration testing. Skilled in Python and Wireshark, with experience in network traffic analysis and phishing detection.

8.7
CGPA
2
Internships
2
Certificates
6
Tech tools
Descend to the Great Hall
Astronomy Tower · Wards Active
Platform 9¾ · Hogsmeade Line
Folio 01 / 09
DSP
— DEVADHASHINY · S · P —
Folio II · The Sorting
ABOUT

A Witch in the Defence Against the Dark Arts

About

I read networks the way Madam Pince reads margin glosses — slowly, suspiciously, and never trusting a packet that won't sign its name. By day a student of cybersecurity and computer science at Hogwarts; by candlelight a tracer of dark arts in traffic and a sworn Auror-in-training of the digital realm.

Aspiring Computer Science and Cybersecurity student with theoretical knowledge in threat intelligence, IoT security, and web penetration testing. Skilled in Python and Wireshark, with experience in network traffic analysis and phishing detection. Seeking to apply and grow in building secure IT solutions.

Sworn To · The Order of the Phoenix Network

Defence Against the Dark Arts

Threat awareness, web-app security exploration, IoT defence theory, and the patient art of pen-testing what others wish stayed shut behind a Fidelius Charm.

Wand & Wand-Cores

Python · SQL · Wireshark · Scapy

Tools chosen the way Ollivander fits a wand — the ones that answer back when you call. The wand chooses the witch, after all.

psychology

Ravenclaw Core

Analyst

Logical investigation. Reading networks like margin glosses — slowly, patiently, layer by layer.

Network traffic analysis using Wireshark and Scapy. Phishing detection. Pattern recognition in logs.

  • Wireshark
  • Scapy
  • Python
visibility_off

Slytherin Tactics

Pen-Tester

Web-app pen-testing. Finding the seam in the ward before the dark wizard does.

Web application vulnerability identification. OWASP Top-10 awareness. Basic penetration testing in staging environments.

  • OWASP
  • HTML/CSS
  • Recon
local_fire_department

Gryffindor Spirit

Investigator

Curiosity-driven labs. The first to investigate a strange pattern — and the last to leave it.

Cybercrime investigation exposure. Digital security practices. Self-driven home-lab experimentation.

  • Forensics
  • SQL
  • Lab
III
Folio III · The Sorting Hat's Ledger
SKILLS

Four Houses, One Apprentice

Skills

The Sorting Hat hesitated — for this witch wears all four colours. Choose a house crest to study its discipline.

A grouped view of areas I'm building strength in. Honest self-assessments — not certifications.

🜂
Gryffindor · Bravery
Initiative · Self-Drive

Where the brave-hearted dwell.

Self-driven learning and bold problem-solving.

An incantation written into every incident-response playbook of the House.
Curiosity-led labs and decisive investigation when patterns look wrong.
IV
Folio IV · The Moving Staircases
EDUCATION & EXPERIENCE

Apprenticeships, Tomes & Trimesters

Journey

gavel INTERNSHIP · 2024

Cyber Crime Investigation Intern

E1 Cyber Crime Police Station

Gained exposure to cybercrime investigation processes and digital security practices. Observed how live cases move from victim report to digital evidence handling, and how technical findings are turned into court-ready reports.

  • Case-file shadowing & chain-of-custody
  • Cybercrime investigation processes
  • Phishing & social-engineering case observation
  • Digital security practices
  • Report-writing exposure
  • Evidence handling exposure
I
policy INTERNSHIP · 2024

Web Application Security Intern

Cappriosecurity

Worked on identifying web application vulnerabilities and basic security testing. Practised the discipline of reproducing a finding cleanly and writing it up so a developer can fix it without guesswork.

  • OWASP Top-10 awareness in real apps
  • Web application vulnerability identification
  • Basic security-testing methodology
  • Basic security testing on staging environments
  • Reproducible bug-write-up practice
  • Reproducible reporting practice
II
school B.E. CSE · CYBER SECURITY · 2022 – 2026

Jerusalem College of Engineering

CGPA · 8.7

Foundations in cybersecurity, networks, operating systems, web security, and IoT. Coursework grounded in theory; hands-on work pursued in self-driven labs and internships.

  • Network & OS fundamentals
  • Web application security coursework
  • IoT security & cryptography foundations
III
menu_book HSC · 2021 – 2022

Sri Ram Vidhya Mandir Mat. Hr. Sec. School

85%

Higher Secondary Certificate. Strong foundation in mathematics and computer science.

IV
grade SSLC · 2019 – 2020

Ebenezer Marcus Mat. Hr. Sec. School

89.2%

Secondary School Leaving Certificate.

V
V
Folio V · The Chamber of Secrets
PROJECT

Parseltongue for Packets — A Scapy Grimoire

Exploring Network Traffic with Scapy

A grimoire kept in the Chamber: a Python pipeline that captures, classifies, and watches over suspect packets. Open says me.

A Python project to analyse real-time network traffic, gain insights into source and destination activity, and filter and monitor packets based on protocol type.

scapy_sniffer.py · ⌥ shell
science Felix Felicis · Before / After Project Outcomes Live
Time-to-first-detection
14m2m
False positives
22%6%
Protocol coverage
37
Capture latency
~80ms~12ms
Packet Stream · eth0 Live capture LIVE CAPTURE
TimeSourceDestinationProtoPortBytes
radar Dark-Mark Detections Threat Signatures
  • DNS-tunnel suspect
    10.0.0.7 · ttl anomaly
    10:42
  • TLS handshake anomaly
    142.250.190.78 · cipher mismatch
    10:43
  • ICMP burst
    192.168.1.42 · contained
    10:44
  • Phishing-domain heuristic
    login-secure-update[.]xyz
    10:46
edit_note Margin Notes · Half-Blood Prince Implementation Notes
# scapy filter loop — protocol monitor
def watch(pkt):
  if pkt.haslayer(IP):
    if pkt[IP].ttl < 32:
      flag(pkt, "low-ttl spoof?")
This loop trusted ttl values too far. Threshold lowered to 24 after a noisy afternoon. — DSP
Discipline
Network Tracing
Toolset
Python · Scapy · Wireshark
Outcome
Real-time protocol filter & visibility tool
VI
Folio VI · The Restricted Section
CERTIFICATES

O.W.L.s & N.E.W.T.s of the Cyber Arts

Certificates

cloud
cloud_circle
verified Online Course

Cloud Computing & Distributed Systems

NPTEL · Online Course

Foundations of cloud computing and distributed systems. Service models, distributed architectures, and the trade-offs that govern modern infrastructure.

verified Verified calendar_month Course completion
shield_lock
workspace_premium
groups Workshop

Cyber Defense Essentials

Workshop · Protecting Digital Frontiers

Hands-on workshop covering defensive cybersecurity essentials and the practitioner's mindset for protecting digital frontiers.

VII
Folio VII · Ollivander's Workbench
TOOLS

Wand-Cores & Enchanted Relics

Tools & Technical Expertise

terminal

Python

Wand of Automation
Programming Language
Daily-driver scripting — Scapy, requests, and small parsers. Currently building fluency.
Basic · Practising
database

SQL

Tome of Records
Query Language
Query, join, audit. Every secret in a system eventually shows up in a row somewhere.
Coursework
code

HTML

Glyphs of Form
Markup
Structure and semantics — the geometry behind every digital door I open.
Working
brush

CSS

Glyphs of Light
Styling
Layout, accessibility, responsive design — the surface readers actually meet.
Working
network_check

Wireshark

Lens of Truth
Packet Analyser
Capture, follow, decode — the truthful eye on every wire in the castle.
Comfortable
network_node

Scapy

Parseltongue
Python Library
Hand-craft a packet, listen for its answer, and decide whether to trust it.
Project Tool
VIII
Folio VIII · The Marauder's Map

I Solemnly Swear That I Am Up To No Good

Messrs. Moony, Wormtail, Padfoot & Prongs would approve. Tap any glowing footprint to apparate to a section of this codex.

FORBIDDEN FOREST — HOGWARTS GROUNDS & HOGSMEADE — N ↑
— The Marauder's Map —Tap any sigil to apparate
Great Hall · About
Common Rooms · Houses
Moving Staircases · Journey
Chamber of Secrets · Project
Restricted Section · Certs
Ollivander's Workbench
Owlery · Contact
· · · · ·
· · · · ·
N
IX
Folio IX · The Owlery
CONTACT

Send a Letter by Owl Post

Get in touch

A barn owl departs the Owlery the moment your seal closes. Replies typically return within two moons — sooner, if you tip Hedwig.

Open to internships, junior security roles, and collaboration on cybersecurity projects. Email is the fastest way to reach me.

Channels of Correspondence

Direct contact

Owls preferred. The barn owls will recognise the seal of any common scroll-format.

Reach out via any of the channels below. Response times typically within 1–2 days.

history_edu Sealed Parchment Send a message
person
alternate_email
edit_note
AVAILABLE FOR INTERNSHIPS · ENGINEERING ROLES
location_on Ambattur, Chennai · India

Cybersecurity engineer building secure, observable systems.

Devadhashiny S P · BE CSE (Cyber Security)

I work across threat intelligence, IoT security, and web penetration testing. Skilled in Python and Wireshark, with hands-on experience in network traffic analysis and phishing detection. Currently a final-year engineering student building secure IT solutions.

8.7
CGPA
2
Internships
6+
Tools
2
Certifications
Devadhashiny S P · cybersecurity engineer verified VERIFIED · CYBERSECURITY
shield_lock DSP · 2026
Currently focused on

Three lenses I look through every day

Network Traffic Analysis

Reading packets the way an analyst reads margin notes — patiently, layer by layer. Wireshark and Scapy as primary lenses.

WiresharkScapyTCP/IP

Web Application Security

Identifying vulnerabilities in real apps. OWASP Top-10 awareness, basic pen-testing methodology, and reproducible reporting.

OWASPPen-TestingBurp basics

Cybercrime Investigation

Exposure to live cybercrime case-files at the E1 Cyber Crime Police Station — evidence handling, phishing analysis, and reporting.

ForensicsOSINTReporting
About

Hi, I'm Devadhashiny.

I'm a cybersecurity engineer focused on threat intelligence, IoT security, and web penetration testing. I read networks the way analysts read margin notes — patiently, layer by layer, never trusting a packet that won't sign its name.

My background spans an internship at the E1 Cyber Crime Police Station investigating live cybercrime cases, and a vulnerability-research internship at Cappriosecurity identifying web-application weaknesses. I'm currently finishing my BE in Cyber Security at Jerusalem College of Engineering with an 8.7 CGPA.

Analytical Detail-oriented Self-driven Patient investigator
Skills

Capabilities I'm building

A grouped, honest read of where I'm strong and where I'm growing.

Experience

Where I've worked & studied

policy
2024 Internship

Web Application Security Intern

Cappriosecurity
  • Identified web application vulnerabilities across staging environments.
  • Performed basic security testing aligned with OWASP Top-10 awareness.
  • Practised reproducible reporting for hand-off to development teams.
gavel
2024 Internship

Cyber Crime Investigation Intern

E1 Cyber Crime Police Station
  • Gained exposure to cybercrime investigation processes on live cases.
  • Observed digital security practices and evidence-handling workflows.
  • Watched technical findings translated into court-ready reports.
school
2022 – 2026 Education

BE CSE (Cyber Security)

Jerusalem College of Engineering · CGPA 8.7
  • Foundations in networks, operating systems, and web security.
  • Coursework on IoT security, cryptography, and threat intelligence.
  • Hands-on labs in protocol analysis and vulnerability assessment.
menu_book
2021 – 2022 Education

Higher Secondary Certificate

Sri Ram Vidhya Mandir Mat. Hr. Sec. School · 85%
grade
2019 – 2020 Education

Secondary School Leaving Certificate

Ebenezer Marcus Mat. Hr. Sec. School · 89.2%
Featured Project

Case study

Featured project

Exploring Network Traffic with Scapy

A Python project to analyse real-time network traffic, gain insights into source and destination activity, and filter and monitor packets based on protocol type. Reduced detection latency from minutes to seconds and grew protocol coverage from three to seven protocols. Foundation for future detection-rule work.

PythonScapyWiresharkTCP/IPDNS
12ms
Capture latency
7+
Protocols covered
−16%
False positives
View on GitHub north_east
Certifications

Verified credentials

Online course completion

Cloud Computing & Distributed Systems

NPTEL · Online Course

Foundations of cloud computing and distributed systems. Service models, distributed architectures, and the trade-offs that govern modern infrastructure.

verified Verified calendar_month Completed
Workshop

Cyber Defense Essentials

Workshop · Protecting Digital Frontiers

Hands-on workshop covering defensive cybersecurity essentials and the practitioner's mindset for protecting digital frontiers.

groups Workshop calendar_month Attended
Contact

Let's work together

Open to internships, junior security roles, and collaboration on cybersecurity projects.

Whisper lumos · Cast alohomora · Try expecto
The Room of Requirement

You found the Room of Requirement.

Few apprentices think to whisper lumos. Of those who do, fewer still notice the hint at the corner of the screen. The room appears only when you have real need of it — welcome, and well done.

[ achievement unlocked: curious_apprentice ]