Available for internships and project work

GITAM University/CSE/3rd Year/Vizag

Tejaswanth Surisetty

Security researcher and AI developer building cloud security tools, LLM systems, and production-ready web applications. I focus on clear evidence, usable interfaces, and reliable engineering.

SIHNational finalist
10+Verified certifications
CloudIAM security focus
Research Output

Research
Publications

Technical writing, project reports, and evidence-backed security analysis

About

Who
I Am

I'm a 3rd year Computer Science student at GITAM University, Visakhapatnam — Core CSE, working at the intersection of offensive security and applied AI. I don't just study how systems behave. I study how they break, why they break, and what it takes to make them impossible to break the same way twice.

My interests span cybersecurity, AI & LLMs, RAG systems, security research, and cloud security. My current flagship work is Hollow Purple — a research-grade adaptive cloud identity detection platform that models GCP IAM as live temporal graphs and surfaces multi-stage attack chains with sub-second latency.

Day-to-day: Arch Linux as my daily driver, Kali for offensive work, active bug hunting across Bugcrowd, HackerOne and Intigriti. I pull apart binaries, build AI systems that make real decisions, and led a team to national stage at Smart India Hackathon 2024.

Programming Languages
PythonJavaScriptTypeScriptJavaLuaHTML / CSS
Frontend & UI Engineering
React 18TypeScriptViteTailwind CSSZustandFramer MotionResponsive UI
Backend & Frameworks
Node.jsFastAPIREST APIsMicroservicesPlaywrightVitest
Security Research
Bug BountyReverse EngineeringPurple TeamIAM SecurityPen TestingMetasploitWiresharkCVE Correlation
Cloud, DevOps & AI
GCPOCIDockerKubernetesTerraformLLMsRAG SystemsAnthropic APIMCP
beyond engineering
Game Development Writer Visual Artist Spotify Artist
Approach

Engineering
Principles

Octopus Lino-cut

AI Systems
Architecture

I build AI workflows with clear responsibilities, retrieval context, evaluation checkpoints, and practical user interfaces. The goal is reliable decision support, not flashy demos that collapse under real usage.

Marlin Art

Security
Research

My security work prioritizes reproducible findings, responsible disclosure, and fast validation. I investigate attack paths, test assumptions, and document evidence so engineers can act with confidence.

Fish School

Detection
Engineering

Strong defense depends on signal quality. I connect telemetry, graph modeling, and severity scoring to turn noisy events into prioritized findings that security teams can review quickly.

Cipher Core Symbol

Evidence
Integrity

Security evidence should survive review. I design around hash-chained events, replayable state, and clear audit trails, so every finding can be traced from signal to source.

Operational Art

Cloud Security
Operations

I focus on IAM governance, event-driven monitoring, attack-path analysis, and response automation for cloud environments where identity is the real perimeter.

RESEARCH_CONSOLE
hollow-purple --verify-ledger Detection Nodes: 15/15 online
Merkle Chain: VERIFIED
Replay Window: 45ms
detect --target=cloud-iam --mode=aggressive Scanning temporal graphs...
Potential lateral movement identified in 'reef-node-721'.
Mitigation factor: 0.98.
whoami --deep Researcher · Security Engineer · AI Developer
Current focus: adaptive cloud detection, agentic AI, and offensive security tooling.
Cloud Security Lab

Cloud IAM
Detection

A focused research environment for identity attack paths, graph evidence, tamper-evident logs, deterministic replay, and clean operator-facing signals.

15+ Microservices
45ms Graph Latency
Projects

What
I Build

Security Research · Featured
Hollow
Purple
adaptive_cloud_identity_detection · 15 microservices
  • Constructs live temporal identity interaction graphs from cloud event streams — detects privilege escalation, lateral movement, and token abuse with sub-second latency.
  • MAHORAGHA — a novel Merkle-tree integrity subsystem producing tamper-evident, cryptographically verifiable audit chains for forensic-grade evidence preservation.
  • Deterministic event replay engine enabling full state reconstruction at any historical point.
PythonJavaScriptGCP IAMTemporal GraphsMerkle IntegrityFastAPI
system_status
projecthollow_purple_v1
cloudGCP
integrityMAHORAGHA (Merkle)
modules15 microservices
replayDeterministic
auditForensic-Grade
subsystems
Ingestion PipelineACTIVE
Graph EngineACTIVE
MAHORAGHA IntegrityACTIVE
Viz DashboardROADMAP
detection_targets
Privilege escalation paths
Lateral movement chains
Token abuse & STS chains
Behavioral drift detection
↑ Click on any project card for complete details
AI Research
HAKARI

Cognitive simulation engine grounded in entropy physics, Bayesian inference, and information theory.

  • 9 mathematically distinct BLOCKs spanning entropy dynamics, intelligence & decision systems.
  • Modular upgrade system enabling runtime extension without simulation restart.
JavaScriptNode.jsBayesian InferenceEntropy Physics
Security
IOT Sentinel

Unified IoT security scanner — 6-phase pipeline reducing manual toolchain orchestration to a single command.

  • Wide-area discovery at 10K pps through deep OS fingerprinting. CVE correlation against major vendors.
  • Industrial protocol exposure detection: Modbus, BACnet, DNP3.
PythonLuaFastAPIDockerKubernetes
Full Stack · AI
CLU

AI-powered legal document analyzer — parses ToS, Privacy Policies, EULAs and surfaces risk scores via Claude API.

  • Severity-tagged findings (0–100 risk score) with plain-English summaries.
  • Vitest + Playwright tests, GitHub Actions CI/CD, deployed to Vercel/Netlify.
TypeScriptReact 18ViteAnthropic APITailwind
Experience

Professional
Focus

Cloud operations security artwork
Cloud security research Practical detection work with clear evidence.
2026
Cloud IAM research

Adaptive detection architecture for modern cloud identity.

Designed Hollow Purple around temporal identity graphs, deterministic replay, and tamper-evident audit chains so cloud privilege movement can be investigated as a timeline, not a pile of logs.

2024-26
Applied AI engineering

LLM systems built for decisions, not demos.

Built AI assistants, RAG pipelines, document analyzers, and agent-style workflows with strong emphasis on traceability, severity scoring, user clarity, and production-minded testing.

Ongoing
Offensive security

Bug bounty practice with responsible disclosure discipline.

Active across vulnerability research, reverse engineering practice, IAM challenge environments, and security tooling, with a bias toward clear evidence and reproducible findings.

Case Studies

Problems
Worth Solving

Detailed defensive systems artwork
Detection engineering

From noisy events to attack paths.

Convert cloud activity streams into ranked identity-path evidence: who touched what, which privilege changed, and how the chain can be replayed for review.

GCP IAMGraph ModelingAudit Replay
Risk scoring visual artwork
AI risk analysis

Readable AI for high-stakes review.

Design LLM workflows that explain why something is risky, attach severity, preserve source context, and stay useful to non-specialists under time pressure.

LLMsRAGRisk Scoring
Red crab security product artwork
Security product design

Security tools people can actually use.

Shape complex backend intelligence into calm, inspectable interfaces with clear states, strong defaults, and direct paths from finding to action.

ReactFastAPIUX Systems
Collaboration

Where I
Fit

Security teams

Threat research, cloud IAM, detection prototypes.

I can help investigate attack surfaces, model abuse paths, build proof-of-concept detection logic, and document findings in a way engineers can reproduce.

AI teams

LLM products with clearer reasoning loops.

I am strongest where AI needs structure: retrieval, evaluation, scoring, agent tooling, prompt systems, and interfaces that make model output accountable.

Product teams

Fast prototypes with production instincts.

I move quickly across frontend, backend, and integration work while keeping the experience legible, accessible, and useful for repeated professional workflows.

Internship focus

Security research, AI systems, cloud platforms.

Looking for teams that value curiosity, evidence, hands-on building, and the discipline to turn hard technical ideas into tools that survive real use.

Hire Me
Portfolio collaboration artwork
Ready for professional work Security, AI, and cloud engineering with range.
Technical Skills

Technical
Toolkit

Security Engineering

Cloud & Offensive Security

  • Bug bounty research and responsible disclosure
  • Cloud IAM attack-path analysis
  • Network scanning and exposure validation
  • Reverse engineering fundamentals
AI Engineering

LLM Systems

  • RAG pipelines and source-grounded answers
  • Agentic workflow orchestration
  • Risk scoring and structured summaries
  • Prompt design, evaluation, and iteration
Cloud Platforms

Infrastructure

  • GCP and Oracle Cloud Infrastructure
  • Docker, Kubernetes, and service deployment
  • Terraform and infrastructure-as-code basics
  • Microservice architecture and APIs
Software Development

Full-Stack Delivery

  • Python, FastAPI, and backend services
  • React, TypeScript, and modern UI systems
  • Node.js integrations and automation
  • Testing, CI, and deployment hygiene
Achievements

Key
Wins

SIH 2024 — National Level

Led team through regional selection to compete at the national stage of Smart India Hackathon 2024. Handled full solution design and team leadership.

Smart India Hackathon
Bug Bounty Researcher

Actively identifying and responsibly disclosing security vulnerabilities in live production systems across public and private programs on Bugcrowd, HackerOne, and Intigriti.

Ongoing · Bugcrowd · HackerOne · Intigriti
Reverse Engineering

Binary analysis and RE practice — studying compiled code to identify vulnerabilities and dissect techniques for defensive research and CTFs.

Ongoing
Purple Team Ops

Combining red team offensive tactics with blue team detection engineering to improve overall security posture in real environments.

Security Research
Cross-Domain Learning

Deliberately study outside CS — finance, international economics, ML, animation, MCP. Building context that pure engineers miss.

Ongoing
Certifications

Verified
Skills

New
Fortinet
Network Security Expert Level 3: Certified Associate
Issued Apr 2026 · Expires Apr 2028 · ID 6209435523TS
New
Anthropic
Model Context Protocol: Advanced Topics
Issued Apr 2026 · Credential ID 52fh992occqb
Oracle Cloud Infrastructure
OCI 2025 Certified Architect Associate
Issued Dec 2025 · Credential ID 102989690OCI25CAA
Cisco Networking Academy
Ethical Hacker
Issued Aug 2025
Google
Google Ads Creative
Issued Oct 2025 · Expires Oct 2026 · ID gacc-video-mastery-lp01
Politecnico di Milano
Machine Learning
Issued Mar 2026 · Politecnico di Milano · Italy
千葉大学 · Chiba University
International Economics
Chiba University · Japan
SPSUFE · Finance
Finance
Saint Petersburg State University of Finance & Economics
HP LIFE
Data Science & Analytics
Issued Oct 2025 · Credential ID a8622dce-2d17
Sony Pictures Animation
Animation Program
Issued Oct 2025

Full list → LinkedIn Certifications ↗

Sardines lino-cut
Education

Academic
Path

2023 — Present
B.Tech — Computer Science
GITAM University · Visakhapatnam
3rd Year · Core CSE · AI, LLMs, Cybersecurity & Cloud Security
CSE
Completed 2023
Intermediate — MPC
ASCNET Junior College · Visakhapatnam
Mathematics, Physics, Chemistry · 844/940 (~89.8%)
MPC
TIMELINE
Career Timeline

Experience
Highlights

A compact professional timeline covering education, security research, AI builds, certifications, and project milestones.

04key milestones
15+systems and services
24-26active build window
focus map
FoundationCSE, math, security basics.
ProjectsAI tools, cloud systems, scanners.
Prooffinals, tests, disclosures, demos.
Nextinternship-ready research work.
capability summary
AI
AI
LLMs, RAG, simulation engines
active
SEC
Security
IAM graphs, IoT scanning, bug hunting
live
UX
UX
clear interfaces for technical evidence
built
2026
Ammonite Spiral
Education

GITAM
University

CSE2023-PresentVizag

Computer Science foundation with a focus on AI, cloud platforms, and security.

  • Core CS foundation across AI, cloud platforms, software engineering, and security.
  • Built portfolio work around research-grade systems instead of isolated demos.
ledger.ref / academic-current
2025
Sea Turtle
Cloud Security

Hollow
Purple

Cloud IAMMerkleGraph

GCP IAM research using temporal identity graphs and evidence replay.

  • Temporal graph model for privilege paths, lateral movement, token abuse, and drift.
  • MAHORAGHA integrity layer for tamper-evident forensic replay and audit trails.
ledger.ref / hollow-purple
2024
Jellyfish
Achievement

SIH
Stage

TeamFinalsDelivery

Led a team through a national-stage product build and technical demo cycle.

  • Turned a problem statement into a working technical direction under competition pressure.
  • Practiced the useful parts of leadership: clarity, delegation, demo readiness, and evidence.
ledger.ref / national-stage
2026
Sardine Tin
Security Practice

Offensive
Research

Bug bountyDisclosureCloud

Responsible disclosure, vulnerability research, and offensive security practice.

  • Research practice focused on reproducible findings, scoped testing, and clean reports.
  • Security interests spanning IAM abuse, IoT exposure, reverse engineering, and tooling.
ledger.ref / offensive-research
Professional roadmap illustration
Professional Roadmap
Current Direction

Professional
Roadmap

The next phase is practical and focused: build security products that make cloud risk visible, make AI outputs accountable, and turn research into interfaces teams can trust.

NowInternship-ready portfolio across security, AI, and full-stack delivery.
NextCloud IAM detection, evidence integrity, and operator-focused dashboards.
GoalSecurity research, AI engineering, and cloud platform roles.
Contact

Let's Work
Together.

Looking for internships and project work in AI, security research, LLM systems, and cloud security. Open to collaborations, research partnerships, and practical engineering problems.

कर्मण्येवाधिकारस्ते मा फलेषु कदाचन।
मा कर्मफलहेतुर्भूर्मा ते सङ्गोऽस्त्वकर्मणि॥

The Observant Mind
Eye Showcase