✓ Email copied!
About Experience Projects Skills Contact
↓ Resume Hire Me
F-1 Student · OPT/CPT Authorized

JASUN
KHADKA

Computer Science student at Washington University of Virginia, specializing in cybersecurity — network traffic analysis, vulnerability research, cloud security hardening, and bug bounty hunting.

2,600+
HTTP Requests Analyzed
15+
Endpoints Tested
70%
Analysis Time Reduced
30+
CTF Challenges
01

Experience

Independent Security Researcher
2026 – Present
Bug Bounty Hunter · HackerOne · TikTok (ByteDance)
● Active Report #3637354
  • Independently identified a valid unauthenticated diagnostic endpoint vulnerability on live-backstage.tiktok.com exposing sensitive internal data including plaintext credentials, confirmed as a legitimate security issue by TikTok security team.
  • Conducted API security testing using Burp Suite, analyzing 2,600+ HTTP requests to identify IDOR vulnerabilities, authentication bypass opportunities, and anomalous patterns across 15+ endpoints.
  • Applied OWASP Top 10 methodology to identify and document web application vulnerabilities including security misconfigurations and unauthorized data exposure.
Cybertection
Jan 2026 – Mar 2026
Cybersecurity Trainee
  • Monitored and analyzed real-time network traffic across 3+ client environments to detect anomalous HTTP request patterns, bot-like behavior, and potential intrusion indicators.
  • Supported threat identification and incident triage by investigating security alerts, documenting attack patterns, and proposing mitigation strategies aligned with network security best practices.
  • Strengthened network defenses by configuring firewall rules and reviewing access controls, improving security posture across monitored infrastructure.
02

Projects

Network Traffic Analyzer
Python Scapy Wireshark 2025
  • Built a Python-based analyzer using Scapy to capture and classify 500+ packets per session with real-time behavioral analysis for port scanning, SYN floods, and HTTP flood detection.
  • Automated detection of 5+ anomaly types including ARP spoofing and brute-force attempts, cutting manual analysis time by 70% via intelligent threshold-based alerting.
  • Generated structured threat reports summarizing flagged traffic, source IPs, attack patterns, and recommended mitigations.
Cloud Security Lab
GCP IAM Cowrie Nmap 2025
  • Reduced unnecessary cloud permissions by 60% by configuring GCP with custom firewall policies and IAM least-privilege roles, simulating enterprise-level network security controls.
  • Deployed a Cowrie Honeypot to capture and analyze 150+ simulated SSH/Telnet brute-force attempts, identifying attack patterns with documented mitigation strategies.
  • Completed 30+ OWASP cybersecurity challenges covering web exploitation, network security, and OSINT through CTF participation.
03

Technical Skills

🛡 Security Tools
Burp SuiteNmapWiresharkScapyHydraCowrie Honeypot
🌐 Network Security
HTTP/HTTPS AnalysisWAF ConceptsBot DetectionFirewall RulesTCP/IPDNS
💻 Programming
PythonScriptingAutomationBash
☁ Cloud
GCPCompute EngineIAMVPCCloud Storage
🔍 Concepts
OWASP Top 10IDORAPI SecurityVuln AssessmentPacket AnalysisAnomaly Detection
🖥 Systems
Linux CLISSHProcess MgmtFile Permissions
04

Certifications

🏆
TryHackMe: Cybersecurity 101
Pre-Security Certificate · Completed
🎯
CompTIA Security+
In Preparation
🐛
HackerOne Bug Bounty
Active · TikTok/ByteDance Valid Submission 2026

Let's
work
together.

Open to internships, part-time roles, and collaborative cybersecurity projects. Always up for bug bounty discussions and CTF teams.

● Available for opportunities