Hi, I'm _

IIIT Bhopal CS '27 operating at the intersection of systems engineering, offensive security, and air-gapped AI infrastructure.
Specializing in High-Performance C++ Engines · Vector Databases · Low-Level Security

Systems Engineering AI Infrastructure Offensive Security
View Infrastructure

$ whoami → bhushan_wayal | systems + security engineer

$ stack → C++17 · Python · PostgreSQL · Linux

$ status → open_to_internships ✓

$ projects --stats → 580K packets · 10M+ Vector Embeddings ✓

$ latest → NexusDB: Bare-metal C++ Vector Engine & Offline RAG

580K+Packets Analyzed
700+Students Trained
3Internships
5Systems Built

01. Applied Research

Volatile Memory Forensics Engine

GitHub Repository ↗

Context: A forensic security tool for detecting fileless malware and process-injection attacks by parsing and analyzing raw memory dumps — evading standard disk-based defenses.

Raw Memory Dump
psutil Parser Engine
Threat Classification Output
Targets fileless malware that leaves zero disk artifacts — the hardest category to detect.

Parses process memory space directly using Python + psutil to identify injected shellcode, hollowed processes, and anomalous memory regions that standard AV scanners miss entirely.
PythonpsutilMemory ForensicsMalware AnalysisIncident Response

Levelled Homomorphic Encryption for O(1) Authentication

PQC RESEARCH

Context: A post quantum batch authentication architecture utilizing the Brakerski Fan Vercauteren (BFV) homomorphic encryption scheme for IoT healthcare networks. Solves the O(N) verification bottleneck.

IoT Device 1 EncBFV(Token 1) IoT Device N EncBFV(Token N) Edge Authentication Gateway (EAG) Homomorphic Batch Aggregation C_batch = Σ (α_i * C_i) Cloud Verifier Dec(sk, C_batch) O(1) Verification Complexity [BATCH VERIFIED]
Allows an edge authentication gateway to aggregate individual encrypted device tokens into a single randomized linear combination using BFV math. The cloud verifier authenticates the entire device group through a single constant time decryption operation, highly reducing latency for dense healthcare environments.
Post-Quantum CryptoBFV HomomorphicIoT SecurityO(1) Complexity

02. Experience

Software & Systems Security Intern

@ NIT Bhopal | Dec 2024 – Feb 2025

  • Engineered async Python pipelines to parse high-volume system logs — replaced manual monitoring with automated threat anomaly detection
  • Built dynamic log extractors for hybrid Linux/Windows environments, converting raw event streams into structured telemetry
  • Mentored 250+ students in algorithmic threat modeling and secure system architecture

Backend & Security Engineering Intern

@ TCR Security | Oct 2024 – Dec 2024

  • Architected Python async data ingestion engine for threat intel feeds — eliminated 20+ hours of manual processing/month
  • Debugged web architectures via raw HTTP traffic analysis; identified and fixed critical data-exposure risks
  • Executed secure code reviews in Python and Java — identified algorithmic bottlenecks and logical execution flaws in production

Network Systems Intern

@ Cisco | May 2024 – Jul 2024

  • Simulated 200+ node enterprise networks with strict ACL architecture
  • Analyzed raw PCAPs in Wireshark to track TCP states and isolate anomalous traffic patterns

Co-Coordinator, Xploit

@ IIIT Bhopal Cybersecurity Club | Aug 2025 – Present

  • Architected and maintained scalable server infrastructure for Capture The Flag (CTF) competition environments — supporting concurrent challenge deployments under load
  • Trained 700+ students in reverse engineering, vulnerability research, and offensive security fundamentals through structured workshops and live CTF competitions

03. Infrastructure & Projects

Identity Graph Resolution

Concurrent Backend Architecture

A highly concurrent backend architecture built with Python and PostgreSQL. Engineered to handle strict ACID transactions for distributed, multi-tiered systems under heavy concurrency by employing robust TOCTOU elimination algorithms.

PythonPostgreSQLGraph AlgorithmsACID TransactionsTOCTOU Elimination

VaultX

Full-Stack Secrets Manager ACTIVE BUILD

Secure full-stack secrets manager leveraging the MERN stack with JWT authentication, full 2FA implementation, and robust AES-256-CBC encryption at rest. Integrates detailed logging and enterprise-grade security within a modern, responsive Tailwind UI.

ReactNode.jsMongoDBJWT/2FATailwind CSS

Volatile Memory Forensics

Fileless Malware Detection Engine SECURITY RESEARCH

Forensic tool detecting process-injection attacks and fileless malware by parsing raw memory dumps directly — evades disk-based AV defenses entirely. Identifies shellcode injection, hollowed processes, and anomalous memory regions.

PythonpsutilMemory ForensicsMalware AnalysisThreat Detection

04. Technical Expertise

Security Domains

Network Security Penetration Testing VAPT Reverse Engineering Threat Detection Incident Response Memory Forensics API Security OWASP Vuln Assessment TLS/Cryptography Post-Quantum Crypto

Systems Engineering

C/C++17 Multithreading Concurrency Memory Management Linux/Unix Internals Distributed Systems System Design SIMD/AVX Optimization Vector Databases ACID Transactions

Backend & APIs

REST APIs Python PostgreSQL MongoDB Redis Data Pipelines JWT/Auth Async Programming Node.js

Infrastructure & DevOps

AWS (EC2/S3) Docker Git Bash CMake CI/CD Concepts

Security Tooling

Wireshark PCAP Analysis psutil Volatility Concepts Burp Suite OWASP ZAP sqlmap
Google Cybersecurity Certificate· Cisco Certified Junior Cybersecurity Analyst· Certified Network Security Practitioner·

05. Let's Build.

Let's Build Resilient Systems

wayalbhushan7144@gmail.com +91 7447 373760
Indian Institute of Information Technology (IIIT) Bhopal

Want to connect?