Hello, I'm
Application security enginner and a pasionate penetration tester with strong knowldge and experience in the cybersecurity.
My journey into cybersecurity began with a simple question: how do systems fail when viewed from an attacker's perspective? That curiosity led me from India to Denmark to pursue a Master's degree in Cybersecurity at the Technical University of Denmark. Since then, I have focused on developing an adversarial mindset — not only understanding how systems are built, but how they can be broken, manipulated, and exploited under real-world conditions.
At DTU, I don't just study attacks — I simulate them. I've conducted penetration testing to expose top OWASP vulnerabilities, and run full kill-chain penetration tests with Metasploit, Nmap, Kali Linux, Wireshark and Burp Suite. I also served as a Teaching Assistant at DTU, supporting Master's courses in Cybersecurity and AI.
Alongside my studies, I worked as a Student Assistant — Application Security Engineer at Philips Medisize, conducting SAST, DAST, and runtime security testing of Android mHealth applications aligned with OWASP MASVS/MASTG, and mapping findings to regulatory controls.
For my Master's thesis — Mobile Healthcare Application Cybersecurity — I gathered security requirements from healthcare regulations including FDA, HIPAA, EU MDR, GDPR, OWASP MASVS and NIST SSDF. I then built HAVA (Health Apps Vulnerability Assessment), a tool to assess applications against those regulatory requirements, integrated it into the development lifecycle so security is evaluated during the building phase, and delivered findings reports directly to developers. The thesis was graded 12 out of 12.
I now work as a Freelance Penetration Tester, assessing web applications for OWASP Top 10 vulnerabilities and delivering structured remediation reports. I operate on one conviction: you cannot defend what you don't fully understand. Outside the terminal, I'm a boxer, a dance choreographer, and a volleyball captain.
class Vasudev: role = "Penetration Tester" uni = "DTU, Denmark" thesis = "Mobile Helathcare Application Cybersecurity" tools = [ "Burp Suite", "Frida", "JADX", "Nmap", "Metasploit", ] mindset = "Think like attacker, defend like engineer"
MSc — Computer Science & Engineering, Cybersecurity Specialization
Studying advanced topics including ethical hacking, network security, data security, incident response, AI, and research in blockchain cyber-physical systems. Working on real-world penetration testing projects and security simulations.
BE — Electronics & Communication Engineering
Built a strong foundation in electronics, circuit design, signal processing, and communication systems. Developed early interest in how hardware and software systems interact — the foundation of systems security thinking.
Student Assistant & Master's Thesis · Copenhagen, Denmark
Conducting SAST, DAST, and runtime security testing of Android mHealth apps aligned with OWASP MASVS/MASTG. Developed HAVA — an automated Python tool for assessing regulatory security requirements (FDA, EU MDR, HIPAA, GDPR), integrated into CI/CD pipelines. Thesis graded 12/12.
Self-Employed · Remote
Philips Medisize · Copenhagen, Denmark
Philips Medisize · Copenhagen, Denmark
Technical University of Denmark (DTU)
Reverse-engineered Android applications to expose top OWASP vulnerabilities — broken authentication, insecure storage, insufficient cryptography, and improper platform usage. Delivered actionable mitigation reports covering input validation and secure authentication.
Conducted an NIST based cybersecurity risk assessment for maritime systems using the NIST framework. Evaluated threats and vulnerabilities in critical shipping infrastructure and developed structured mitigation strategies.
Built a suite of security scripts from scratch: password strength analyzer, DNS record explorer, network port scanner, firewall configurator (iptables), and default-credential tester — each tested in live environments.
Simulated end-to-end cyberattacks using the Cyber Kill Chain framework with Metasploit, Nmap, and Burp Suite — across recon, exploitation, and post-exploitation phases.
Systematic literature review on blockchain applications in cyber-physical systems. Analyzed how distributed ledger technology enhances security, integrity, and transparency where digital and physical components intersect.
Designed and built this cyberpunk-themed developer portfolio from scratch — dark glassmorphism UI, matrix rain canvas, particle system, SVG line art, 3D card hover, animated skill meters, and scroll-driven effects. Deployed via GitHub Pages.
vasudev.infoRepresenting and uniting the Telangana community across Scandinavia — organizing cultural events, supporting incoming Indian students, and fostering connections between professionals and scholars in Denmark.
Boxing demands pattern recognition, composure under pressure, and rapid counter-decisions — the same traits that make an elite penetration tester.
Choreographing is systems design — coordinating multiple agents toward a timed, unified output. That orchestration mindset maps directly to security incident coordination.
Captaining means reading the game in real-time, rotating resources, and making split-second calls — not unlike red team coordination during a live engagement.