> Cybersecurity & Development
Keshav
Rao
// about.me
Building secure systems.
Breaking insecure ones.
Hi there! I specialize in Cyber Security with over 2+ years of experience in IT. With a proven track record in Production Support, Incident Response, and Automation, my journey has led me to specialize in Cybersecurity through a postgraduate degree in Toronto, ON.
Beyond my technical skills, I'm a team player who thrives on challenges and new learning opportunities. I enjoy hiking, running, football, and cooking for family and friends.
IDENTITY_VERIFIED
Keshav Rao
Cybersecurity Analyst · Software Developer · Toronto, ON
// skills.map
What I work with
// projects.log
Things I've built
Azure Suspicious Login Detection System
Replicates a real-world SOC environment — simulating, detecting, and alerting on suspicious login activity using Azure Sentinel, Log Analytics, and Logic Apps. Built a full threat detection pipeline with KQL queries and an interactive analyst dashboard.
Windows Event Log Monitoring & Alerting
PowerShell-based automation to monitor Windows Event Logs — specifically targeting failed login attempts (Event ID 4625). Extracts recent failed logins and triggers custom email alerts, simulating SOC-level detection capabilities.
Syncora — Secure Cloud Storage
Security-first SaaS platform for student file storage implementing RBAC, MFA, AES-256-GCM encryption, and audit-logging aligned with SOC 2 access control principles. Managed full SDLC from design through production deployment.
Azure-based Website View Counter
Serverless view counter using Azure Functions and Table Storage to track unique visits. Implemented IP logging and timestamping for basic analytics within the Azure free tier.
Encryption Methods using Python
Streamlit-based web simulation showcasing various encryption methods including symmetric, asymmetric (RSA, DSA), and hashing algorithms — built as an interactive educational tool.
MAC Address Changer
Python tool using the Subprocess module to modify the MAC address of any network interface on the system — demonstrating practical knowledge of network-layer identity and ethical hacking concepts.
Keystroke Logging using Python
Python-based keylogger using the pynput library that captures keystrokes in real time and stores them in a local log file — built to demonstrate how keystroke monitoring works and highlight its ethical and security implications.
// my.background
Experience & Credentials
Service Delivery Analyst
Fidelity Information Services (FIS) Global
- ◆
Led disaster recovery procedures during critical system outages, maintaining SLA compliance and minimizing operational downtime across production environments.
- ◆
Automated security and operational workflows using Microsoft Power Automate and Bash, reducing manual overhead and improving response consistency.
- ◆
Developed shell scripts for automated server health monitoring, enabling proactive detection of system anomalies in production.
- ◆
Managed incident and change request lifecycles in ServiceNow using ITIL-aligned processes, supporting structured escalation and resolution workflows.
- ◆
Collaborated cross-functionally with engineering and stakeholder teams to investigate and resolve production incidents, ensuring timely remediation.
IT Trainee
Fidelity Information Services (FIS) Global
- ◆
Monitored production systems for security events and anomalies, generating detailed ServiceNow tickets to support structured escalation and incident resolution workflows.
- ◆
Performed log analysis using Splunk to identify suspicious activity patterns and support early-stage threat detection across enterprise environments.
- ◆
Authored operational runbooks, incident response procedures, and troubleshooting documentation to standardize team workflows and accelerate onboarding.
FREE TOOL
Domain Vulnerability Scanner
Enter any domain to receive a free, automated security assessment across 7 key checks. Need a full audit?
I agree to the . I only scan domains I own or have permission to test.
⚡ 5 free scans per hour · Results are informational only