Sudipta Pandit

Software Engineer

Bengaluru, Karnataka, India6 yrs experience
Most Likely To Switch

Key Highlights

  • Experienced in developing security automation tools.
  • Strong background in infrastructure and programming.
  • Contributed to open-source cybersecurity projects.
Stackforce AI infers this person is a Cybersecurity Engineer with a focus on Infrastructure and Security Automation.

Contact

Skills

Core Skills

SecurityInfrastructureProgrammingComputer Science

Other Skills

Security AutomationRelational DatabasesArchitectureGitDocker ProductsWeb Application SecurityCyber-securityLinuxSoftware DevelopmentInformation SecurityDjangoPythonOperating SystemsJavaScriptAmazon Web Services (AWS)

Experience

6 yrs
Total Experience
1 yr 9 mos
Average Tenure
2 yrs 2 mos
Current Experience

Microsoft

Software Engineer 2

Mar 2024Present · 2 yrs 2 mos · Bengaluru, Karnataka, India · Hybrid

Cloudsek

3 roles

Senior Security Engineer

Promoted

May 2022Feb 2024 · 1 yr 9 mos

InfrastructureProgrammingSecurity

Security Engineer

May 2021Apr 2022 · 11 mos

InfrastructureProgrammingSecurity

Security Engineer

Feb 2021Apr 2021 · 2 mos

Gnu/linux users' group nit durgapur

Tech Head

Jul 2020Jun 2021 · 11 mos · Durgapur, West Bengal, India

InfrastructureProgramming

Training and placement cell, nit durgapur

Training and Placement Coordinator

Mar 2020Jun 2021 · 1 yr 3 mos · Durgapur, West Bengal, India

The honeynet project

Google Summer of Code student developer in The Honeynet Project

May 2019Aug 2019 · 3 mos · Remote

  • Heralding is a honeypot for multiple protocol with one goal , logging credentials. This tool makes it very easy to setup a credentials honeypot. During this summer, we introduced support for RDP and MySQL protocol. As some of the protocols do not transmit password during authentication, they transmit a hashed value of the password often combined with salt. So, we developed a dictionary-based hash cracker for VNC protocol. Also, we observed some protocols transmit few useful information about clients (i.e version, language etc) before the authentication phase, so we developed a base for auxiliary logging. Using that base, we introduced auxiliary logging for SSH protocol. Which helped us to get some additional information about client software used like client version, mac used, cipher used, compression method used.
Computer ScienceSecurity AutomationSecurity

Education

National Institute of Technology Durgapur

Bachelor of Technology - BTech — Computer Software Engineering

Jan 2017Jan 2021

Jenkins School

Higher Secondary — Science

Jan 2009Jan 2017

Stackforce found 100+ more professionals with Security & Infrastructure

Explore similar profiles based on matching skills and experience