I’m a Master’s student in Information Security at Carnegie Mellon University, with industry experience in offensive security, vulnerability research, and security engineering. My interests span red teaming, hardware security, distributed systems, and applied cryptography.
Most of my project repositories are private due to academic, research, or organizational constraints.
If you’re a recruiter or hiring manager and would like to review my work, please reach out I’m happy to share access where possible.
- eCTF @ CMU: Hardware hacking, embedded security, and attack/defense techniques for constrained devices
- Distributed Systems: Designing and building fault-tolerant, scalable systems
- Quantum Computing: Exploring quantum algorithms and security implications
- Network Security: Secure architectures, traffic analysis, and defensive mechanisms
Languages: Python, Go, C/C++, Bash, PowerShell, Assembly x86, VHDL
Security Tools: Burp Suite, Metasploit, Cobalt Strike, Nmap, Nessus, Wireshark, Ghidra, IDA
Platforms & Frameworks: ADB, Akamai-CPC & API security, Autopsy, Burp Suite, Cobalt Strike, Docker, Ghidra, IDA, Kibana, Metasploit, Snort, SOF-ELK, Splunk, Nmap, Nessus, Oxygen Forensics, Power BI, Qiskit, Q-Radar, Wireshark, Xilinx
Focus Areas: Cyber Forensics, Network Security, Cloud Security, Cryptography, Incident Response, Access Control, Mobile & IoT Security, Hardware Security, Distributed Systems, Red Teaming
Certification: Cryptography and Network Security, CEHv11, CND, OSCP (In-Progress)
- Email: kaghao@andrew.cmu.edu
- LinkedIn: https://www.linkedin.com/in/keyur-aghao
- Calandly: https://calendly.com/kaghao-andrew
