Hello!

I'm Apoorv Dayal, a security software engineer with demonstrated experience in hunting cloud critical bugs, Application security and Infrastructure security. I also have over 5 years of experience in Application, Cloud and Network Security!

Get in touch apoorv.dayal@outlook.com

Background

I'm currently working as Security Software Engineer with Azure DevSec team at Microsoft. I have previously worked with FireEye Mandiant Intelligence dissecting malwares and attributing malware samples to threat groups as a Technical Intelligence Analyst. My areas of interest include container and Kubernetes security, Cloud Security, Penetration testing, Application and Network Security. In the past, I have worked with Ernst & Young for their enterprise advisory service line.

As a security engineer, I enjoy discovering security vulnerabilties, with current focus on Azure offerings, performing security reviews.

When I'm not in front of a computer screen, I'm probably playing my piano, reading about psychology or crossing off another item on my bucket list.

Skills

I’ve picked up quite a few skills during the course of my professional experiences, and aim to improve these skills everyday. Here are a few of the tools / technologies and focus areas that I have experience with:

Languages
  • C#
  • Python
  • KQL
Frameworks
  • .NET
  • OWASP Top 10 Web / Kubernetes / LLMs / Containers
Techniques
  • Secure code reviews
  • Architecture and Design reviews
  • Threat model reviews
  • Penetration testing
  • Network traffic analysis
  • Container security
  • Kubernetes
  • Red Teaming
Platforms
  • Azure
  • Infrastructure deployment and review
Interests
  • Creative Red Teaming
  • Penetration Testing
  • Cloud Security
  • Network Security
  • Application Security
  • Threat Modeling
  • Architecture & Design review
Experience
April 2021 - Present
Security Software Engineer II
Graduate Research Assistant (Data Analytics & ML)
Graduate Research & Course Assistant
May 2020 - August 2020
Technical Intelligence Analyst Intern
June 2017 - July 2019
Cybersecurity Analyst III
View My Resume
Projects

Created threat models, security policies and CI/CD pipeline for development activities as DevSecOps. Worked with a team of doctorate level researchers and professionals to create secure lightweight protocol on top of Bluetooth stack.

Python Protocol Design Firmware Code (x86) Threat Modeling Architecture Design Cloud Deployment Jenkins Kubernetes DevSecOps

The application was built as a responsive web application, compatible to be deployed as a PWA using container view for native applications on iOS and Android platforms, using the following tech stack - Python-Flask, Google Cloud, Platform Templating engine - Jinja FrontEnd, HTML + CSS ,Google Maps API, Chatbot Flow. Lex Google GeoLocation API Google Places API Google Cloud SQL Service Google GeoCoding API

Python Flask AWS LEX Threat Modeling Architecture Design Cloud Deployment Jinja Kubernetes Docker

Utilising blockchain for creating a decentralized malware detection system. Motivated by the fact that today's Malware detection systems and Firewalls are mode Predictable than being predictive.

Assembly Code Python Blockchain Malware Analysis Autoencoder based Deep Learning

Created an aggregator tool as a part of Mandiant Intelligence Company wide Intern Project, to aggregate intel from OSINT sources, internal tools and sandboxes to suggest intelligent pivots to Malware Analyst in a bid to ease their job. This is currently in production for company's internal use only and analytics data suggested a reduction of nearly 35% time an analyst previously spent on a sample.

Python REST APIs Reverse Engineering Malware Analysis OSINT Integration Regex

Researched and executed red team exercises, automating using hill climbing techniques to automate and successfully discover potential flaws in autonomous vehicle simulation on TurtleBot3.

Python Red Teaming Metasploit Threat Modeling Q Learning Wireless Attacks Application Security Buffer Overflow Masquerading Code Review and Exploitation Vulnerabiltiy Assessments Machine Learning Autonomous Vehicle Security