LINUX ADMINISTRATOR · SECURITY RESEARCHER · BHOPAL, INDIA

AMANDEEP
SINGH

 

Entry-level Linux Administrator with hands-on lab experience managing RHEL/CentOS & Ubuntu systems. Wrote 20+ Bash automation scripts, deployed 10+ Docker/Podman containers, and hardened multi-VM environments. Active bug bounty researcher & open-source tool author.

0BASH SCRIPTS
0CONTAINERS
0OPEN-SOURCE TOOLS
0% ATTACK SURFACE ↓
SCROLL
// 01

ABOUT.SH

amandeep@kali:~$
┌──(amandeep㉿kali)-[~] └─$ whoami Amandeep Singh — Linux Admin & Security Researcher   └─$ cat location.txt 📍 Bhopal, India   └─$ cat skills --summary RHEL/CentOS · Ubuntu · Kali Linux Docker · Podman · AWS (EC2/S3/IAM/VPC) SELinux · iptables · firewalld · fail2ban Bash scripting · Python · Go CLI tools Bug Bounty · Recon · Penetration Testing   └─$ cat availability.txt STATUS: Open to on-site, remote, or hybrid roles   └─$ echo $LANGUAGES English (Professional) · Hindi (Native)   └─$ _ 
EDUCATION
B.Com — Sadhu Vaswani Autonomous College, Bhopal
2019 – 2022

Higher Secondary (Science) — Sanskar Public High School, Bhopal
2018
CONTACT
📧 amansenu10@gmail.com
📱 +91-8602241181
🐙 GitHub: DaddyUchiha
🔗 LinkedIn profile available
FOCUS AREAS
Linux automation & system hardening · Containerization & cloud infrastructure · Bug bounty & recon tooling · Open-source CLI development in Go & Bash
// 02

SKILL_SET.JSON

🐧
LINUX SYSTEMS

Deep expertise in RHEL/CentOS, Ubuntu, and Kali Linux. System admin, package management, systemd, kernel tuning, and privilege escalation defense.

RHEL/CentOSUbuntuKalisystemdSELinuxACLs
🔒
SECURITY HARDENING

SSH key-only auth, fail2ban, SUID/SGID auditing, SELinux enforcing mode, iptables/firewalld/UFW, /etc/sysctl.conf kernel tuning and log analysis.

iptablesfirewalldfail2banSSH hardeningLog analysis
🐳
CONTAINERS & CLOUD

10+ Docker containers and Podman pods deployed. AWS infrastructure across EC2, S3, IAM least-privilege, VPC Security Groups. Dockerfiles, volumes, compose.

DockerPodmanAWS EC2IAMS3VPC
⚙️
SCRIPTING & AUTOMATION

20+ Bash scripts for log parsing, health reporting, backups, user provisioning. Python basic scripting. Go CLI tool development with goroutine worker pools.

BashPythonGoCronGit
🌐
NETWORKING & TOOLS

TCP/IP, DNS, SSH fundamentals. Wireshark/tcpdump packet analysis, ip/netstat/ss. Network segmentation and service monitoring.

TCP/IPDNSWiresharktcpdumpSSH
🐛
BUG BOUNTY & RECON

Recon pipelines, subdomain enumeration, directory fuzzing, JS secret extraction, HTTP 403 bypass research. Active penetration testing simulation experience.

ReconSubdomain enum403 bypassOSCP style
LINUX ADMINISTRATION92%
BASH SCRIPTING & AUTOMATION88%
DOCKER / PODMAN / CONTAINERS85%
SECURITY HARDENING (SELinux/firewall)83%
AWS CLOUD INFRASTRUCTURE75%
GO CLI DEVELOPMENT72%
BUG BOUNTY / PENETRATION TESTING70%
// 03

EXPERIENCE.LOG

2022 — PRESENT  
Linux System Administrator
Independent Lab Practice — Self-built Multi-VM Environment
  • Designed and managed a self-built multi-VM lab on RHEL/CentOS and Ubuntu — maintained as production-grade environments.
  • Enforced least-privilege across all systems — sudoers, ACLs, SUID/SGID auditing — reduced attack surface by 40%.
  • Administered 15+ services via systemctl; diagnosed failures through journalctl and restored uptime with zero data loss.
  • Locked down SSH on every system — root login disabled, key-only auth, AllowUsers restricted, fail2ban deployed.
  • Deployed 10+ Docker containers and Podman pods — Dockerfiles, volumes, networking, docker-compose.
  • Wrote 20+ Bash scripts for log parsing, health reporting, backups, and user provisioning — reduced manual time by 60%.
  • Provisioned AWS infrastructure — EC2, S3 bucket policies, IAM least-privilege roles, VPC Security Groups.
// 04

PROJECTS.EXE

01
BASH · BUG BOUNTY

ReconForge — Bash Automation Pipeline

End-to-end Bash recon pipeline: subdomain enumeration → alive host filtering → directory fuzzing → JavaScript extraction → API key scanning. Built for real bug bounty workflows.

github.com/DaddyUchiha/reconforge ↗
BashSubdomain EnumDir FuzzingJS ScanningAPI Keys
02
GO · NETWORKING

Gohunter — Go CLI Recon Tool

Concurrent Go CLI tool for subdomain enumeration and directory brute-forcing with a goroutine worker pool and modular architecture. High-speed recon with clean terminal output.

github.com/DaddyUchiha/gohunter ↗
GoGoroutinesCLIConcurrencyBrute Force
03
GO · SECURITY RESEARCH

403evasion — HTTP Bypass Research Tool

Go tool for HTTP 403 bypass via header injection techniques. Demonstrates deep understanding of Linux web server behaviour, middleware parsing, and access control misconfiguration.

github.com/DaddyUchiha/403evasion ↗
GoHTTPHeader Injection403 BypassWeb Security
04
BASH · LINUX SECURITY

Multi-VM Security Lab

Production-grade self-built multi-VM lab on RHEL/CentOS and Ubuntu. SELinux enforcing, SSH hardened, iptables/firewalld configured, fail2ban deployed. Full sudoers and ACL audit.

RHELUbuntuSELinuxiptablesfail2banSSH
05
DOCKER · AWS

Container & Cloud Infrastructure

Deployed 10+ Docker containers and Podman pods with custom Dockerfiles, persistent volumes, docker-compose orchestration. Provisioned AWS EC2, S3, IAM, and VPC Security Groups.

DockerPodmanEC2S3IAMVPC
06
BASH · AUTOMATION

Linux Automation Script Suite

20+ Bash scripts covering log parsing with grep/awk/sed, system health reporting, automated backups, user provisioning, and cron scheduling. Reduced manual admin time by 60%.

Bashawk/sedCronLog ParsingBackup
// 05

CERTIFICATIONS.PEM

🏆
Introduction to Cybersecurity Job Simulation
FORAGE — 2026
Industry-recognized virtual job simulation covering real-world cybersecurity analyst tasks.
SOC Monitoring — investigated simulated incidents, triaged alerts, identified IoCs  ·  Penetration Testing — structured offensive security tasks including recon & vuln ID  ·  Phishing Analysis — examined phishing emails, documented findings for incident reporting.
// 06

CONNECT.SH

LET'S WORK TOGETHER

Open to Linux administration roles, security research collaborations, bug bounty teams, or freelance system hardening projects. Response within 24 hours.

send_message.sh