
SUYASHJAIN
Div: ADVERSARIAL ENGINEERING
| Subject: | JAIN, Suyash | Codename: | PHANTOM-7 |
| Status: | ACTIVE | Classification: | TS/SCI |
| DOB: | ██/██/2005 | Nationality: | Indian |
| Location: | ████████, TN, India | Affiliation: | SRM Institute of Science and Technology |
| Role: | CS Undergraduate (Y3) / Network Security Specialist | Contact: | hi@suyashja.in |
I. Executive Summary
Subject is a high-value specialized operative with verified proficiency in network security, reverse engineering, and infrastructure systems. Profile classification: Specialist(non-Generalist). Primary methodology: Adversarial Engineering—systematic deconstruction and interception of existing systems. Academic record and competitive victories confirm top-percentile technical competency.
II. Technical Capabilities
Network/Security
- • Cisco IOS, VLANs, STP
- • SDN (Mininet, Ryu, OVS)
- • Traffic interception (mitmproxy)
- • SSL bypass, Frida, Jadx
Data Engineering
- • ETL pipelines (Python, Pandas)
- • Elasticsearch, web scraping
- • Docker, K8s CronJobs
Blockchain
- • Solidity smart contracts
- • Polkadot/PolkaVM
- • Ethers.js integration
Languages
- • C/C++, Python, TypeScript
- • Solidity, SQL, Shell
- • JavaScript, Java
III. Operational Profile
Cognitive Pattern: Deconstructionist. Subject verifies system behavior via direct observation (CLI, logs) rather than documentation. Prone to analysis paralysis when data transparency is limited. Additional assessment available upon clearance verification.
Communication: Dual-mode operator. Default: reserved, observant. Activated: rapid-fire technical articulation. Prioritizes logic transfer over social formalities when discussing complex systems.
Career Vector: Targeting SRE/DevSecOps/Security Research positions via "Proof of Work" portfolio strategy. Open to remote and international assignments.
IV. Operational History
Developed scalable ETL pipelines. Implemented web scraping with session management and retry logic. Orchestrated containerized workflows via Docker/Kubernetes.
CGPA: 7.4. Outstanding Grade in Computer Networks. Active CTF competitor.
V. Verified Commendations
- Polkadot Assethub Hackathon 2025: 1st Place ($1,500) — Edgetributor SubDAO
- HackathonX CTF 2024: 1st Place / 150 teams — NCSRC @ IIT Madras
- Fetch.ai Hackfest 2023: Final Round — IIT Bombay
VI. Notable Operation: VULPIX
[1ST PRIZE — JUN 2025]
NFT combat platform built for Polkadot Assethub Hackathon. Developed real-time battle state management via Convex, authored Solidity smart contracts for turn-based combat on PolkaVM, and integrated Polkadot AssetHub with Ethereum contracts via ethers.js.
Stack: Next.js, TypeScript, Convex, Solidity, Polkadot API
VII. Assessment
Subject demonstrates elite-tier engineering capabilities in network security and infrastructure domains. Recommended for consideration in specialized security, SRE, or research operations.
VIII. Contact Protocols
— END OF DOSSIER —