Author Image

Hi, I am Akshat

Akshat Dharmesh Patel

Sr. IT Security and Support Specialist at Maryland Athletics

I’m a cybersecurity engineer with a passion for building secure, reliable systems that make a real impact. My work blends network defense, cloud security, and automation, from creating SnortEduGuard, an AI-powered academic intrusion detection system, to designing SecureScalr, an AWS-based e-commerce platform built on best-practice architecture. At UMD Athletics, I manage vulnerability remediation, strengthen compliance, and support day-to-day IT needs - all while exploring new ways to integrate cloud-native observability and smarter detection techniques.

Collaborative Mindset
Work Ethic
Leadership

Skills

Experiences

1
Maryland Athletics

January 2024 - Present

College Park, Maryland, USA

The mission of Maryland Athletics is to educate, develop, and serve student-athletes through a culture of academic and athletic excellence. The UMD Athletics IT department offers comprehensive technological support, enhancing the collegiate athletic program’s infrastructure, including network system maintenance, secure data management, and IT support across various platforms.

Sr. IT Security & Support Specialist

June 2025 - Present

Responsibilities:
  • Lead weekly vulnerability review sessions using Rapid7 InsightVM, collaborating with DIT to prioritize and remediate high-risk findings across 600+ assets.
  • Validate vulnerabilities through targeted exploit simulation, reducing false positives by 28% and improving remediation accuracy.
  • Enhance compliance posture by aligning security operations with regulatory frameworks and internal policies.
  • Manage endpoint security, including encryption enforcement, Intune MDM enrollment, and access policy troubleshooting.
  • Resolve IT support requests via HelpScout, ensuring timely resolution for Athletics staff and maintaining operational uptime.
  • Develop reusable Terraform modules to replicate and migrate infrastructure from Azure to AWS.
Information Security Engineer and IT support Intern

June 2024 - August 2024

Responsibilities:
  • Resolved over 200 IT tickets, maintaining a 99.9% system uptime across the campus.
  • Updated IDS rules, reducing potential security threats by 25%.
  • Ensured 100% device compliance with MDM policies, resolving non-compliance issues within 24 hours using Bomgar remote assistance.
  • Defined department-specific application allow lists, reducing unauthorized software downloads and minimizing ABR incidents.
  • Conducted internal security audits and compliance checks, aligning operations with HIPAA, PCI, and SOX regulations.
  • Led data inventory audits, classifying 5,000+ system and software entries, and managed vendor communications on data retention policies.
  • Delivered 10+ seminars on social engineering and typosquatting, boosting employee awareness and eliminating incident reports.
Terp Host

January 2024 - June 2024

Responsibilities:
  • Assisted in marketing strategy and fan experience at UMD Athletics, enhancing fan engagement during matches across various sports.

College Park, Maryland, USA

The mission of College of Information (INFO) is to drive progress in information and technology through innovative research and educational programs. They aim to enhance information reliability, ensure fair access, and apply data and technology to address key societal, economic, and environmental challenges. Their goal is to prepare future professionals to tackle real-world problems and make significant contributions to the field.

Adjunct Professor

September 2025 - Current

Responsibilities:
  • Lecturer for INST346 Infrastructure, Architecture & Technologies and INST464 Decision Making for Cybersecurity.
  • Responsible for over 200 students collectively, delivering lectures, labs, and case studies that integrate real-world tools and scenarios.
  • Designed project-based assessments to strengthen applied technical skills and critical thinking.
  • Provided mentorship and guidance to students pursuing careers in IT infrastructure, cloud computing, and cybersecurity.
Graduate Teaching Assistant

August 2024 - May 2025

Responsibilities:
  • Assist Dean Dr. Keith Marzullo in delivering instruction for INST 346, focusing on Technologies, Infrastructure, and Architecture.
  • Lead and manage lab sessions, ensuring students effectively engage with practical aspects of network security and distributed systems.
  • Provide guidance and support on complex technical concepts related to network architecture, data management, and system security.
2

3
Medium

May 2023 - Present

Remote

Akshat regularly publishes articles on recent cybersecurity events, including detailed breakdowns of incidents and actionable recommendations for cyber defense strategies.

Independent Writer

May 2023 - Present

Responsibilities:
  • Explore the depths of cybersecurity with weekly reports, delving into severe cyber events.
  • Gain comprehensive insights through detailed breakdowns of each incident, dissecting technical nuances.
  • Access precise and actionable recommendations for preemptive and responsive cyber defense strategies.
  • Learn advanced techniques and proactive measures to mitigate risks and prevent future cyber threats.

Changa, Gujarat, India

CHARUSAT University is a leading institution in Gujarat, India, known for its focus on research-driven education and technological innovation, providing students with hands-on experience in cutting-edge fields like cybersecurity and information technology.

Cybersecurity Intern

January 2023 - May 2023

Responsibilities:
  • Led the development of an advanced Intrusion Detection System, enhancing network security by detecting and restricting over 95% of unauthorized network activities using customized Snort rules.
  • Engineered a user-friendly interface for the IDS, facilitating the analysis of over 10,00,000 network packets daily, streamlining threat detection and response.
  • Conducted comprehensive cybersecurity research on the e-governance website, identifying and fortifying 30+ security loopholes, significantly boosting the site’s defense against cyber threats.
4

5
Source Automation

February 2023 - August 2023

Texas, USA (Remote)

Source Automation specializes in delivering reliable and flexible machine control and integration services, offering expert PLC programming, SCADA systems, and on-site technical troubleshooting. With a focus on competency, availability, and tailored solutions, we ensure your business stays at the forefront of technology.

Freelancer

February 2023 - August 2023

Responsibilities:
  • Researched and wrote in-depth technical articles on automation and control systems.
  • Produced clear and concise user manuals, guides, and technical documentation for software applications, ensuring usability for both technical and non-technical users.
  • Optimized content for SEO, improving online visibility and engagement.
  • Collaborated closely with software developers and engineers to translate complex technical concepts into easily understandable content for blogs, websites, and marketing materials.

Education

Masters of Engineering in Cybersecurity
GPA: 3.66 out of 4
Taken Courses:
Course Name Total Credit Obtained Credit
ENPM691 Hacking of C Programs and UNIX Binaries 3 3
ENPM694 Networks and Protocols 3 3
ENPM665 Cloud Security 3 3
ENPM693 Network Security 3 3
ENPM686 Information Assurance 3 3
ENPM685 Security Tools for Information Security 3 3
ENPM634 Penetration Testing 3 3
ENPM687 Digital Forensics and Incident Response 3 3
ENPM695 Secure Operating Systems 3 3
ENPM818N Cloud Computing 3 3
Bachelors of Technology in Electronics and Communication Engineering
CGPA: 9.64 out of 10
Extracurricular Activities:
  • Participated in and wrote scripts for a one-act play and skit for the university cultural fest.
  • Served as a board member for the university magazine.
  • Internshala Student Partner for 3 months.
  • Club Coordinator at Code for Cause.
Research Collaboration:
Research collaboration with Dr. Trushit Upadhyaya (University principal) and Dr. Upesh Patel (Department head), focusing on antenna technology and its cybersecurity implications.
Schooling
GPA: 8.72 out of 10
Extracurricular Activities:
  • Ashoka House Captain

Projects

TeleTrackr - Observability Pipeline on EKS with OpenTelemetry
DevOps & Observability Engineer April 2025 – May 2025

Designed and deployed a full-stack observability pipeline for a microservices-based e-commerce platform on Amazon EKS. Integrated OpenTelemetry for trace and metrics collection, Prometheus for alerting, and Grafana for visualization. Automated Helm-based Kubernetes deployments and implemented GitHub Actions CI/CD pipelines with rollback safety. Configured PrometheusRule custom alerts and AlertManager for real-time Gmail notifications on pod failures. Demonstrated production-grade monitoring, alerting, and reliability engineering aligned with SRE best practices.

SnortEduGuard - Student Integrity Surveillance System
Security Engineer April 2025 - April 2025

Built a real-time, production-grade academic intrusion detection system to promote exam integrity using Snort 3, Flask, and AI. Implemented 40+ custom detection rules for AI tools (ChatGPT, Bard, Claude), VPNs, study-help sites (Chegg, CourseHero, Quizlet), and C2 behavior (DNS tunneling, Nmap). Logs parsed and visualized with Python-based automation and a fully responsive dashboard. Integrated NLP with spaCy to enable natural language Smart Search and alert summarization for instructors. Developed “Exam Mode” using a default-deny network policy to highlight unauthorized traffic during proctored sessions.

SecureScalr - AWS Powered Ecom Solution
Cloud Architect March 2024 – April 2025

Designed and deployed a secure, scalable, production-ready e-commerce platform entirely on AWS. Implemented multi-tier VPC architecture with private EC2 app servers, ALB + Auto Scaling Group, RDS MySQL (Multi-AZ), and CloudFront-backed S3 static hosting. Integrated AWS WAF, ACM, IAM roles, Secrets Manager, and bastion host to enforce layered security. Enhanced observability using CloudWatch dashboards and alerts, automated testing via JMeter, and Lambda for cost-saving schedules. Validated real-world architecture under AWS Well-Architected Framework for resilience, security, performance, and cost-efficiency.

Digital Forensic Investigation - Rebel Malware Analysis
Digital Forensic Investigator November 2024 - December 2024

Conducted a detailed forensic investigation of a suspected malware developer’s workstation to analyze the “Rebel” malware framework. Recovered encrypted files, reconstructed deleted data, and uncovered malware persistence techniques, obfuscated payloads, and unauthorized data exfiltration to offshore C2 servers. Leveraged tools like Autopsy, FTK Imager, VeraCrypt, Wireshark, and PhotoRec to identify key artifacts and provide recommendations for enhanced security practices.

Penetration Testing of "The Masked DJ's" IT Infrastructure
Penetration Tester November 2024 - December 2024

Performed an in-depth penetration test of “The Masked DJ’s” IT infrastructure, identifying critical vulnerabilities like misconfigured SMB/RDP settings, weak password policies, and unpatched software (e.g., EternalBlue). Leveraged advanced tools and frameworks, including Nmap for network reconnaissance, Impacket for credential extraction, and AWS CLI for cloud assessments, gaining root access to key systems, including Active Directory and web servers. Delivered actionable recommendations such as MFA implementation, network segmentation, and robust patch management to enhance security posture.

Penetration Testing Challenge - Web Application Enumeration and Exploitation
Ethical Hacker September 2024 - October 2024

I conducted a structured penetration test on a virtual machine to identify vulnerabilities in a web application and retrieve a critical “flag.” Using tools like Nmap for port scanning, Gobuster and Enum4Linux for enumeration, and Wireshark for network traffic analysis, I identified misconfigurations and uncovered plaintext FTP credentials. This facilitated SSH access, followed by privilege escalation through artifact analysis (e.g., .bash_history) and a successful brute-force attack using Hydra, leading to the extraction of the web application creator’s details.

CMMC 2.0 Level 1 Compliance for Web Application Security
Auditor February 2024 - March 2024

This project involved assessing the web application of the Michael Scott Paper Company to ensure it met CMMC 2.0 Level 1 requirements. The task was to review the security measures in place for the web application and its hosting environment. We identified gaps in the company’s access control, file upload security, and external connections, providing recommendations for improvements. The full report outlines our findings and detailed analysis of compliance with CMMC requirements, offering insights into necessary changes for enhanced security.

Risk Assessment of Autonomous Vehicle Telematics Using DREAD and STRIDE Methodologies
Independent Project January 2024 - February 2024

In this project, I conducted a comprehensive risk assessment for a self-driving vehicle equipped with various telematics systems. Using the DREAD methodology, I estimated quantitative risk values, translated these into qualitative categories, and linked the results to the STRIDE model to address potential threats and vulnerabilities. This analysis provided valuable insights into the security posture of autonomous vehicles and informed risk management strategies.

Security Assessment and Robust AWS Architecture Design for Healthcare Application-MedCircle
Course Work Project January 2024 - February 2024

In this project, I assessed and mitigated security vulnerabilities in a healthcare company’s cloud infrastructure. I focused on identifying weaknesses in IAM policies, unencrypted data, vulnerable virtual machines, inadequate network security, and the lack of robust logging and monitoring. I provided detailed recommendations for enhancing access controls, data encryption, vulnerability management, network security, and disaster recovery to ensure the confidentiality, integrity, and availability of sensitive patient data.

The Security Architecture Redesign and Proposal for CustomerFirst Bank
Team Lead February 2024 - April 2024

In this project, I developed a comprehensive security enhancement plan for a company network compromised by prolonged attacks. I proposed solutions to fortify both the Linux and Windows networks, ensuring secure inter-network communication and addressing challenges related to remote work capabilities. The plan focused on preventing attacks, detecting breaches, and providing strategies for managing undetected attacks, all within a $500K budget constraint. My approach included upgrading network defenses, implementing robust monitoring systems, and addressing gaps in security policies and procedures.

Drone Authentication System
Developer June 2021 - August 2021

The Drone Authentication System project addresses the growing need for secure drone operations amid rising security concerns, such as the recent drone attacks at the Indian Air Force Station, Jammu. Instead of a blanket ban, this system offers a targeted solution by allowing only authorized drones to operate in specific areas. The system uses GPS and GSM modules, an Arduino Nano board, and a single-channel relay to monitor and control drone access. When a drone initiates a flight, the GPS module fetches its location and compares it with predefined restricted zones. If the drone attempts to enter a restricted area, access is denied, and the system cuts off power to the drone. For flights outside restricted zones, the drone’s credentials and pilot information are sent to the Drone Authentication Center (DAC) for verification. If the DAC confirms the request, it grants permission to fly. This approach ensures enhanced security while enabling safe drone operations.

Intrusion Detection System (IDS) for Charusat University
Network Security Engineer December 2020 - January 2021

The Intrusion Detection System (IDS) project focuses on developing a solution to detect unauthorized network traffic and security breaches. Leveraging Snort’s rule-based engine, the IDS differentiates between legitimate and malicious IP addresses, with traffic sourced from Charusat University’s network. It effectively identifies packets from various sources, including Google, PDFs, MP3s, e-governance sites, and protocols like FTP, as well as file types such as JPEG and GZIP. Addressing security gaps in Charusat’s e-governance platform, the IDS includes continuous monitoring, student IP restrictions, and integration with an Intrusion Prevention System (IPS). A dedicated application enhances monitoring by logging data in real-time, removing the need for manual CMD checks, and offers a user-friendly interface. The project aims to bolster network security and reliability in educational environments.

Automatic Staircase Lighting System
Lead Developer March 2020 - June 2020

The Automatic Staircase Lighting System leverages an Arduino UNO microcontroller to enhance home safety and efficiency. The system uses ultrasonic motion sensors to detect movement and trigger a relay module that controls the staircase lights, ensuring illumination only when necessary. Integrated with a Bluetooth module, it allows users to adjust settings via a smartphone app, offering manual control and custom light delays. A dimmer circuit smooths LED brightness transitions, minimizing abrupt current changes and extending LED life. This intelligent system optimizes energy use and improves staircase safety, demonstrating effective home automation.

Typing Speed Improving Game
Developer December 2020 - January 2021

This game is a speed typing game that helps players improve their typing speed. The player in this project must press the same keys as the letter displayed on the game screen. If the player makes a typing error, the game is over and the total score is displayed.

Current Focus

Featured Posts

Embracing the Journey: My Life as a Cybersecurity Student and Aspirations for the Future

Read the full post on Medium

Hello, everyone! My name is Akshat Dharmesh Patel, an Indian guy who’s recently adopted the nickname “AK” after realizing how tricky my full name can be for my American friends to pronounce. Currently, I’m pursuing my master’s in cybersecurity at the University of Maryland, College Park, and what a journey it’s been! Full of surprises, challenges, and growth, I’m here to share some of my experiences with you.

TryHackMe: Anonymous Walkthrough

Read the full post on Medium

Hello, everyone! I’m Akshat Patel, a cybersecurity master’s student and a hands-on learner with a passion for ethical hacking and system exploitation.

Today, I’m walking you through the TryHackMe: Anonymous room. This is an engaging challenge that tests your skills in enumeration, FTP exploitation, and privilege escalation. Let’s get started!

Advent of Cyber 2024 — Day 24: Restoring the Light of SOC-mas

Read the full post on Medium

Hello everyone! I’m Akshat Patel, pursuing a master’s in cybersecurity. I’m passionate about learning, solving challenges, and sharing insights. Today, I’ll take you through my experience with Day 24 of Advent of Cyber 2024, where we restored the lights of a smart city sabotaged by Mayor Malware!

Credentials with 2FA: How It Works and How Attackers Bypass It

Read the full post on Medium

Hello everyone! I’m Akshat Patel, pursuing a master’s in cybersecurity. I’m constantly learning and sharing insights with others. Today, I want to talk about Two-Factor Authentication (2FA) and how attackers bypass this crucial layer of security.

Cisco Duo Security Breach: Third-Party Vendor Compromised, Exposing MFA SMS and VOIP Data

Read the full post on Medium

Table of Contents

  1. Introduction
  2. Details of the Breach
  3. Impact on the CIA Triad
  4. Recommendations for Improved Security
  5. Final Thoughts

Introduction

On April 1, 2024, Duo by Cisco notified its customers about a significant security breach involving a third-party vendor responsible for handling SMS and VOIP multi-factor authentication (MFA) messages. The compromise occurred through an unnamed service provider, whose internal systems were accessed by threat actors using credentials obtained via a phishing attack. Cisco Duo did not disclose the identity of the telephone provider used for sending MFA messages. The breach involved accessing a series of MFA SMS messages containing sensitive Personally Identifiable Information (PII) such as contact numbers, phone carriers, citizenship status, states, and metadata including the date and time of message generation. However, the breached data did not include the content of the messages or any unauthorized message transmissions.