IT/OT/ICS Cybersecurity Specialist | Building AI-Powered Zero-Trust | Protecting Critical Infrastructure
IT/OT/ICS Cybersecurity Specialist with expertise in risk management, vulnerability assessments, and zero-trust architecture. Protecting critical infrastructure and digital assets from cyber threats.
© 2024 Hemangi Ahir. All original content and case studies are protected. Unauthorized reproduction prohibited.
Cybersecurity professional with diverse interests
Protecting IT/OT/ICS environments in critical infrastructure. I focus on the details—network diagrams, firewall policies, and tracing packets—because accuracy matters when systems are on the line.
Forever a student. Teaching myself offensive security, preparing for CEH, and never afraid to say "I don't know... yet." Every problem is a puzzle worth solving.
Sketching attires and writing a book for self-publishing. Security is part art, part science—that's my philosophy, and creativity keeps my mind sharp.
The paradox of emerging tech: incredible promise, but people hesitate because they don't know who to trust. I want to be part of the solution—building systems that aren't just powerful, but genuinely trustworthy. That's what drives me every day.
Academic foundation in cybersecurity and engineering
Information Technology – Cybersecurity
The University of Texas at San Antonio
Industrial Engineering
Universidad Santa Maria La Antigua
Real-world cybersecurity implementations and research
Advanced AI-driven zero-trust architecture implementation for dynamic policy enforcement and threat prevention.
View Case StudyComprehensive security strategy for protecting critical operational technology infrastructure across global facilities.
View Case StudyRapid hardware threat detection combining asset visibility with offensive security techniques using Flipper Zero.
View Case Study© 2024 Hemangi Ahir. All original content and case studies are protected. Unauthorized reproduction prohibited.
🔬 Active learning environment • Updated as I progress
Hands-on penetration testing course covering the full attack lifecycle—from reconnaissance to post-exploitation.
WiFi cracking, MITM, ARP spoofing
SQL injection, XSS, file uploads
Metasploit, backdoors, privilege escalation
Client-side attacks, phishing, BeEF
Building a virtualized pentesting lab following EC-Council's CEH curriculum and the 5 phases of ethical hacking.
OSINT, footprinting, enumeration
Nmap, vulnerability assessment
System & web app attacks
Persistence, pivoting, exfiltration
Ethics First: All testing conducted in isolated labs I own. Learning to think like an attacker so I can defend better.
© 2024 Hemangi Ahir. All original content and case studies are protected. Unauthorized reproduction prohibited.
Security tools and frameworks expertise
© 2024 Hemangi Ahir. All original content and case studies are protected. Unauthorized reproduction prohibited.
Insights and research on cybersecurity
Cybersecurity insights, tutorials, and industry analysis.
© 2024 Hemangi Ahir. All original content and case studies are protected. Unauthorized reproduction prohibited.
Let's connect and discuss cybersecurity
Richmond, VA
(Willing to relocate)