Security Researcher · Kathmandu, Nepal

Rajan Bhatta

Cybersecurity & Ethical Hacking student at Coventry University. Focused on malware analysis, penetration testing, and building security tools that matter.

LocationKathmandu, Nepal
DegreeBSc CyberSec & Ethical Hacking
StatusOpen to work
01 — About

Who I am

I'm Rajan Bhatta, a cybersecurity student based in Kathmandu, Nepal, studying for my Bachelor's at Coventry University through Softwarica College.

My main interest is Malware Analysis — understanding how malicious software behaves, persists, and evades detection in isolated lab environments. I pair this with hands-on Penetration Testing and Digital Forensics through real projects and continuous self-study.

I regularly work through CTF challenges, practice Linux privilege escalation, and explore low-level concepts like buffer overflows and heap exploitation. I want to understand systems deeply enough to both break and secure them.

Education
BSc Cybersecurity & Ethical Hacking
Coventry University · Softwarica College, Nepal
2024 – Present  |  Expected 2027
High School
High School Diploma, Science
Kathmandu Model Secondary School
Aug 2021 – Jul 2023
AnalyticalSelf-motivated Detail-orientedResearch-drivenTeam player
0
Security projects built
0
Certifications earned
2024
Started security journey
OPEN
Available for penetration testing internships & remote work
02 — Skills

What I work with

🔴
Offensive Security
  • Malware analysis — static & dynamic
  • Penetration testing — web & network
  • Vulnerability assessment
  • Intrusion detection systems
  • Basic reverse engineering
🔵
Programming
  • Python — security tools & automation
  • Bash scripting
  • PHP — web security testing
  • JavaScript / HTML / CSS
  • Basic C & Assembly
🟢
Networking
  • TCP/IP, DNS, HTTP/HTTPS
  • Port scanning & enumeration
  • Scapy & socket programming
  • Network traffic analysis
  • Subnetting fundamentals
🟣
Malware Analysis
  • Static analysis — strings, PE headers
  • Dynamic analysis & process monitoring
  • Persistence & obfuscation techniques
  • Isolated VM lab environments
  • IDA Pro / Ghidra (learning)
🟡
Web App Security
  • SQL injection identification
  • XSS vulnerability testing
  • PHP & MySQL systems
  • Session-based authentication
  • OWASP fundamentals
Linux & Tools
  • Linux privilege escalation
  • Kali Linux / Parrot OS
  • Metasploit (basics)
  • Nmap & Wireshark
  • CTF challenges & labs
🔶
Exploit Concepts
  • Buffer overflow concepts
  • Heap & stack overflow
  • Vulnerable machine testing
  • Digital forensics basics
  • Threat intelligence (learning)
03 — Projects

What I've built

Project 001Active Research
Malware Analysis Lab

Studying malware behavior in fully isolated VM environments. Static analysis covers PE headers, file structure, and strings. Dynamic analysis includes process behavior monitoring, network calls, and registry changes. Documenting persistence mechanisms and obfuscation techniques found in real-world samples.

Static AnalysisDynamic AnalysisPythonIsolated VMGhidra
GitHub
Project 002Built
Network Scanner

Custom Python network scanner with ping sweep, port scanning, service detection, and basic OS fingerprinting. Built using Scapy and raw socket programming.

PythonScapySocketsNmap
GitHub
Project 003Built
Intrusion Detection System

Python-based IDS using signature detection via regex patterns and anomaly detection for suspicious traffic. Includes an email alert system for real-time threat notifications.

PythonRegexSMTPAnomaly Detection
GitHub
Project 004In Progress
Web Security Projects

Login systems using PHP & MySQL, identifying SQL injection and XSS vulnerabilities, and building secure session-based authentication as part of web security coursework.

PHPMySQLSQLiXSSSessions
GitHub
04 — Certifications

What I've earned

🛡️
ISO/IEC 27001:2022 Information Security Associate™
SkillFront
December 2025
🔒
CRPO — Certified Ransomware Protection Officer
EU Cyber Academy
December 2025
Certified AppSec Practitioner v2 (CAP)
The SecOps Group
December 2025
🎯
Certified Cybersecurity Educator Professional (CCEP)
Red Team Leaders
November 2025
05 — Contact

Get in touch

Open to penetration testing internships, security research collaborations, and CTF team opportunities. Based in Kathmandu — available for remote work worldwide.