CENTRAL INTELLIGENCE DOSSIER
SUYASH JAIN
ID2633795235
CLASSIFIED

SUYASHJAIN

Div: ADVERSARIAL ENGINEERING

Subject:JAIN, SuyashCodename:PHANTOM-7
Status:ACTIVEClassification:TS/SCI
DOB:██/██/2005Nationality:Indian
Location:████████, TN, IndiaAffiliation:SRM Institute of Science and Technology
Role:CS Undergraduate (Y3) / Network Security SpecialistContact:hi@suyashja.in

I. Executive Summary

Subject is a high-value specialized operative with verified proficiency in network security, reverse engineering, and infrastructure systems. Profile classification: Specialist(non-Generalist). Primary methodology: Adversarial Engineering—systematic deconstruction and interception of existing systems. Academic record and competitive victories confirm top-percentile technical competency.

II. Technical Capabilities

Network/Security

  • • Cisco IOS, VLANs, STP
  • • SDN (Mininet, Ryu, OVS)
  • • Traffic interception (mitmproxy)
  • • SSL bypass, Frida, Jadx

Data Engineering

  • • ETL pipelines (Python, Pandas)
  • • Elasticsearch, web scraping
  • • Docker, K8s CronJobs

Blockchain

  • • Solidity smart contracts
  • • Polkadot/PolkaVM
  • • Ethers.js integration

Languages

  • • C/C++, Python, TypeScript
  • • Solidity, SQL, Shell
  • • JavaScript, Java

III. Operational Profile

Cognitive Pattern: Deconstructionist. Subject verifies system behavior via direct observation (CLI, logs) rather than documentation. Prone to analysis paralysis when data transparency is limited. Additional assessment available upon clearance verification.

Communication: Dual-mode operator. Default: reserved, observant. Activated: rapid-fire technical articulation. Prioritizes logic transfer over social formalities when discussing complex systems.

Career Vector: Targeting SRE/DevSecOps/Security Research positions via "Proof of Work" portfolio strategy. Open to remote and international assignments.

IV. Operational History

MAR 2025 — MAY 2025
Data Engineer Intern — TAIYO.AI (San Francisco, Remote)

Developed scalable ETL pipelines. Implemented web scraping with session management and retry logic. Orchestrated containerized workflows via Docker/Kubernetes.

AUG 2023 — PRESENT
B.Tech Computer Science — SRM Institute

CGPA: 7.4. Outstanding Grade in Computer Networks. Active CTF competitor.

V. Verified Commendations

  • Polkadot Assethub Hackathon 2025: 1st Place ($1,500) — Edgetributor SubDAO
  • HackathonX CTF 2024: 1st Place / 150 teams — NCSRC @ IIT Madras
  • Fetch.ai Hackfest 2023: Final Round — IIT Bombay

VI. Notable Operation: VULPIX

[1ST PRIZE — JUN 2025]
NFT combat platform built for Polkadot Assethub Hackathon. Developed real-time battle state management via Convex, authored Solidity smart contracts for turn-based combat on PolkaVM, and integrated Polkadot AssetHub with Ethereum contracts via ethers.js.
Stack: Next.js, TypeScript, Convex, Solidity, Polkadot API

VII. Assessment

Asset Class: HIGH-VALUE / SPECIALIZED
Status: ACTIVE

Subject demonstrates elite-tier engineering capabilities in network security and infrastructure domains. Recommended for consideration in specialized security, SRE, or research operations.

VIII. Contact Protocols

LinkedIn:
jsuyash05
GitHub:
j-suyash
X/Twitter:
@jsyshbin
DOSSIER-SJ-2026 // SANITIZED1/1

— END OF DOSSIER —