Akshay Galgali

Akshay Galgali

Cybersecurity Engineer

AkshayGalgali
Scroll!

About Me

I am Akshay Galgali (He/Him), a Cybersecurity Engineer.

Network Security, Incident Response, Vulnerability Assessments, and Penetration Testing.

Master of Science degree in Cybersecurity at the University of Houston.

Spring 2023 Graduate.

Let's Connect on TryHackMe, HackTheBox

View my résumé.

Feel free to contact me!

Professional Experience

Simnovus, Cary, North Carolina
Wireless Security Engineer
Jan 2023 - Jan 2024
University Information Technology (UIT), Houston, Texas
Wi-Fi Engineer Intern
Oct 2022 - Jan 2023

Skills

Projects

Git Graph
Malicious URL Detection

Developed a security system to detect Malicious URLS by utilizing a Phish tank dataset containing malicious and benevolent URLs to generate various URL-based, domain-based, page-based features.

Trained a Random Forest classifier on generated features to predict a URL as malicious or benevolent so as to mitigate the increasing phishing attacks happening throughout the internet.

Python, Random Forest, Phish Tank Dataset
keystroke
Keystroke Logger - HACKTHEKEY

Developed a keystroke logger in an active browser using python scripting and libraries, to retrieve sensitive information and credentials of a user like username, passwords, credit card details , etc.

The credentials and URL information with login timestamp is sent via email to the attacker.

Python Scripts, Virtual Machine, Python Libraries
SCADA-BR
SCADA-PLC

Automation of two chemical mixing in a tank with application of OT security. [This project is developed and demostrated in SCADA-BR].

OT Security, ICS Firewall, PLC programming, Follows NIST SP 800-41 Standards.

SCADABR, Ladder Logic, PLC
BHOJANBOT-AI
BhojanBot.AI

AI based Restaurant Recommendation Chatbot which is built using Google DialogFlow.

The chat bot ask for Cuisine Preference and Location from the user. Then the chatbot sends a list of restaurants to the user with their Zomato Links.

This chat bot is integrated using Telegram.

ChatBot, Artificial Intelligence, DiagFlow
MODBUSATTACK
MODBUS ATTACK & PACKET INJECTION

Simulated and Demostrated MODBUS Attack & Packet Injection Attack in Industrial Control System in an Master-Slave environment.

This is simulated using Modsak Simulator.

ICS Security - ICS Firewall, Centralized Control, Restricted Access.

Modsak Simulator, Virtual Machines, Shell Scripting, Industrial Control Systems
MGTRAVELS
MGTRAVELS - Website

MGTRAVELS is a website which is dedicated towards Tour and Travels business.

Website created and desined using html, php, css, JS, MySQL and integrated with payment gateway. Integrated payment gateway system PayPal with third-party APIs to leverage complete payment gateway infrastructure and enable payments directly on web app, mobile app, or website.

The Payment Gateway is secured with XES Encryption Security, Tokenization, SET, SSL, PCI DSS.

HTML, PHP, CSS, JS, MySQL
vcl
Virtual Chemistry Lab

Web Application which simulates chemical experiments with the help of an interactive environment containing animations for a multiplicity of reactions and gives information about some molecules, making boring experiments look thrilling.

Technology Stack - Apache HTTP Server, MySQL, HTML5, CSS3, XAMPP, MySQL, PHP, JS.

HTTP Server, PHP, JS, MySQL, HTML5, CSS3
vcl
Cryptanalysis - Encryption and Decryption

Online Cipher Identifier tool to determine the type of the Cipher.

An encryptor tool that uses the Caesar Cipher to encrypt any file. The user may pick the ASCII shift of the data. A decryptor tool that, again, uses the Caesar Cipher to decrypt any file previously encrypted with the Caesar Cipher. The user must specify what ASCII shift to decrypt the file with.

Ceaser Cipher, Brute Force Analysis, Cryptool, Python
IRP
Incident Response Management - Network/Log Analysis

Investigation on generated alerts where a system operated by a user Bob from HR behaves maliciously as if another person is controlling it. Additionally, Bob mentioned that he noticed the mouse moving out of character and files had been moved across the system.

Report - providing mitigation and prevention measures to avoid these kinds of attacks in the future or in any other system.

Incident Response Plan, Analysis, Virtual Machines, Linux
View All Projects

Research / Technical Papers

SOC
SOC - Setup, Responsibilities and Accomplisment

Keywords - SOC, Security Operations, Security Management, Security Operations Centres.

Abstract - Security Operations Centres (SOC) has exponentially grown its significant because of the frequent cyber events and cyber activities, this has led majority of the enterprises move towards development of centralized security operations to prevent these kinds of events.

P2-CRM
Cybersecurity Risk Management - Risk Management Plan for an IT Firm

Keywords: Risks, Risk Management, CISO, Data Security, IT company, threats, IT, analysis.

Abstract - This paper provides an illustration of the risk management strategy for handling data security and business-related risk management. I will also outline the importance of risk management in the IT firm and how it affects every element of the business.

SCADA-BR
Mitigating Cybersecurity threats to Industrial Control Systems: SCADA

Keywords - SCADA, Control Systems, Cybersecurity, mitigation, ICS.

Abstract - The expedite growth, and advancement in SCADA systems have made this control system more vulnerable to the cybersecurity threats and attacks. SCADA was introduced into the world wide web (Internet) which exposed this system to most common cybersecurity threats like virus, malware, intrusions.

APT
Analysis of Advance Persistance Threat Group And its Impact on the Organization

Keywords- APT, Advance Persistent Group, SolarWinds, threats, Organization, Enterprise, firm.

Abstract - APT (Advance Persistent Threat Group) have become more sophisticated, diversified, and successful in recent times. Despite the fact that security technologies, and security policies continue to evolve, security breaches continue to occur at an alarming rate.

VCL
Virtual Chemistry Lab - VCL

Keywords - Experiments, Simulation, Chemistry lab, JavaScript, MySQL, Web browser, Virtual lab.

Abstract - This paper is to scale the entire chemistry laboratory to a single-window on the computer. The project idea is developed for Polytechnic college having the specified set of experiments in their syllabus. It is a web-based application designed to perform chemistry experiments.

DBC
Database Cryptography in Todays Enterprise

Keywords - Database encryption; Enterprise; Vulnerabilities; Standards; Exploits; Mitigation, cryptography, key management;

Abstract - This paper highlights the current standards that todays enterprises utilize to keep their databases secure and always accessible to their customers. These standards are utilized to maintain the data at rest and data in transit. In this paper, we'll also explore the vulnerabilities and exploits which is faced today's enterprise databases.

Education

Git Graph
University of Houston - Main

Master Of Science in Cybersecurity

Aug 2021 - May 2023


Relevant Course Work

Network Security
Security Operations Center
Applied Cryptography
Industrial Control Systems Security
Critical Thinking Ino-Sec
Project Management
Secure Enterprise Computing

Houton, Texas
vcl
University Of Mumbai

Bachelor Of Engineering in Information Technology

Aug 2018 - May 2021


Relevant Course Work

Adv. Digital Forensics
Network Security
Cryptography
Big Data Analytics
Artificial Intelligence
Python Programming
Internet Of Things
Data Structures

Mumbai, India
IRP
University Of Mumbai
Diploma in Computer Engineering
May 2015 - Aug 2018

Relevant Course Work

Programming in C++ jAVA Python
Database Management System
Applied Physics Chemistry
Data Structures
Computer Networks
Computer H/W & S/W
Engineering Drawing
Data Analytics

Mumbai, India

Certifications

ISC2 Certified in Cybersecurity
ISC2
Aug 2023
Credential ID: 2ZFZ7MVVXRFP

View
Google's Cybersecurity Professional
Google
Jan 2024
Credential ID: 8HSHDHDSGAJDI

View
Python Programming
University of Michigan
Apr 2020
Credential ID: 2ZFZ7MVVXRFP

View
Cloud Computing
Coursera
Apr 2020
Credential ID: CNTDFBKHY96T

View
Adult First Aid - CPR/AED
American Red Cross
May 2022
Credential ID: 00U127S

View