mjcube1999@security:~$

MARIAN JOHN SECURITY ENGINEER

Houston, TX

Security Engineer specializing in endpoint security, cloud governance, and application security. Experienced in strengthening data protection, improving compliance rates, and implementing security hardening across enterprise environments.

3.8
GPA - MEng Cybersecurity
TOP 1%
TryHackMe Ranking
96%
Endpoint Compliance Rate

Experience

Security Engineer

Perfect Solutions Group Inc
July 2025 - Present

Application Security Engineer

Bright Mind Enrichment and Schooling (BME)
Aug 2024 - July 2025

System Engineer - DevSecOps

Tata Consultancy Services
Aug 2020 - Aug 2022

Projects

IBM Clicked Incident Management

Jan 2024 - May 2024

Developed and implemented an enterprise security program for an ed-tech startup, ensuring strong cybersecurity. Managed Incident Response for a phishing attack, swiftly mitigating threats and minimizing damage. Developed a security plan and roadmap integrating SIEM, IDS, firewalls, and compliance with NIST, ISO, and cyber laws.

TOOLS USED:
IP Quality Score URL Scan Virus Hash Total Virus Talos Intelligence IP Location
→ View on GitHub

Information Assurance

Jan 2024 - May 2024

Led the development and implementation of an integrated security solution using IPS, IDS, and EDR technologies. Performed network security assessments, identified vulnerabilities, deployed endpoint security, and enforced DLP strategies. Implemented SOAR tools for efficient incident response and disaster recovery.

TOOLS USED:
Snort Suricata CrowdStrike Falcon Microsoft Defender Microsoft Sentinel Qualys Nessus Wireshark
→ View on GitHub

Cloud Security (AWS & Azure)

University of Maryland

Comprehensive cloud security implementation covering IAM, AWS GuardDuty, WAF configurations, and security hardening across AWS and Azure environments. Focused on cloud security compliance and best practices.

TOOLS USED:
AWS IAM AWS GuardDuty AWS WAF Azure Security Center
→ View on GitHub

Penetration Testing

University of Maryland

Hands-on penetration testing projects covering web application exploitation, network attacks, privilege escalation, and post-exploitation techniques using industry-standard tools.

TOOLS USED:
Metasploit Burp Suite Nmap Hydra SQLmap
→ View on GitHub

Secure Coding & Software Engineering

University of Maryland

Implementation of secure coding practices, vulnerability analysis, and building secure applications. Focus on preventing common vulnerabilities like SQL injection, XSS, and CSRF.

TECHNOLOGIES:
Python C/C++ JavaScript OWASP
→ View on GitHub

Hacking of C Programming and Unix Binaries

University of Maryland

Low-level binary exploitation, reverse engineering, and vulnerability research in C programs and Unix systems. Includes buffer overflow, format string exploits, and return-oriented programming.

TOOLS USED:
GDB Ghidra Pwn-dbg Radare2
→ View on GitHub

Network Security

University of Maryland

Network security implementations including packet analysis, intrusion detection, firewall configurations, and network-based attacks and defenses.

TOOLS USED:
Wireshark Snort Nmap Cisco Packet Tracer
→ View on GitHub

Security Tools for Information Security

University of Maryland

Comprehensive exploration of security tools and frameworks used in information security, including SIEM, vulnerability scanners, and security automation.

TOOLS COVERED:
Splunk Nessus OpenVAS OSSEC
→ View on GitHub

Embedded Systems Security and Hacking

University of Maryland

Security analysis and exploitation of embedded systems, IoT devices, and hardware security including firmware analysis and hardware hacking techniques.

FOCUS AREAS:
Firmware Analysis IoT Security Hardware Hacking ARM Assembly
→ View on GitHub

Education

🎓

Master of Engineering

Cybersecurity
University of Maryland, College Park
2022 - 2024
3.8
/ 4.0
CUM LAUDE
KEY COURSES:
Cloud Security Penetration Testing Hacking of C & Unix Secure Coding Information Assurance
📚

Bachelor of Technology

Electronics & Communication
Amrita Vishwa Vidyapeetham
2016 - 2020
7.3
/ 10.0
KEY COURSES:
Networks & Protocols Wireless Communication Embedded Systems OOP

Technical Skills

🛡️
🛡️

Cybersecurity

Risk Assessment Digital Forensics IT Compliance Packet Analysis Log Analysis Threat Analysis Exploitation Cryptography Linux Security Kerberos
🔧
🔧

Security Tools

Microsoft Sentinel CrowdStrike Falcon Qualys Mimecast Microsoft Defender Wireshark Burp Suite SQLmap Nmap Splunk SIEM Snort John the Ripper Hydra Ghidra Nessus
💻
💻

Programming

Python PowerShell Sigma Yara C/C++ JavaScript HTML/CSS MongoDB MySQL Bash

Achievements & Recognition

🎓
University of Maryland

3.8 GPA

MEng Cybersecurity

Cum Laude • UMD 2024

🏆
TryHackMe

TOP 1%

TryHackMe Global

→ View Profile
📄
IEEE

Published

IEEE ICCSP 2020

→ View Paper
NCL

NCL Spring 2025

Top 11% (918 / 8,487 participants)

→ View Solutions
NCL

NCL Fall 2024

Top 12% (1,038 / 8,484 participants)

→ View Solutions
NCL

NCL @ WiCyS 2023

Top 11% (34 / 302 participants)

→ View Solutions

Security Writeups

📚

CTF Writeups & Security Challenges

Comprehensive documentation of TryHackMe rooms, Hack The Box machines, and KC7 digital forensics challenges with detailed methodology and solutions

50+
Challenges
3
Platforms
900+
Screenshots
Explore All Writeups →

Certifications

🔐
CompTIA Security+

Security+

CompTIA

CERTIFIED
🎯
eJPTv2

eJPTv2

Junior Penetration Tester

CERTIFIED
🛡️
NSE 1

NSE 1

Network Security - Fortinet

CERTIFIED