Research Fellow (Deakin Cyber Research and Innovation Centre (Deakin Cyber))
Research Fellow (Centre for Cyber Resilience and Trust (CREST))
Research Fellow (Centre for Cyber Security Research Innovation (CSRI))
Research Fellow (Deakin Blockchain Innovation Lab (DBIL))
Leading million-dollar, grant-funded R&D initiatives to bridge the gap between advanced academic theory and applied, scalable enterprise solutions.
Architectural Leadership & Responsibilities:
Project & Team Leadership: Lead complex, multi-year projects in collaboration with the Cyber Security Cooperative Research Centre (CyberCRC), directing dynamic, cross-functional teams of researchers, developers, and engineers.
Strategic Consortium Building: Collaborate closely with a network of elite academic partners (including CSIRO Data61 and UNSW) and industry stakeholders (including Tata Consultancy Services) to align architectural development with real-world, mission-critical infrastructure needs.
Intellectual Property (IP) Generation: Drive the organisation's IP strategy, serving as the primary liaison with patent attorneys to document invention disclosures, file patent applications, and secure commercial rights for novel security frameworks.
Funding & Grant Strategy: Identify, architect, and successfully apply for major research and industry grants to secure ongoing funding for next-generation cybersecurity development.
Key Architectural Initiatives & Research Portfolio:
Continuous Authentication Infrastructure: Designed and developed the architectural blueprint for Robust Authentication using Ambient Intelligence in Smart Environments (RAAISE).
Enterprise Digital Identity: Architected privacy-respecting, highly compliant Verifiable Credential Digital Wallets (DCW) alongside advanced Remote Identity Proofing techniques for high-assurance user authentication.
Next-Generation Cryptography: Exploring and developing Post-Quantum Cryptography techniques and quantum-enabled defence mechanisms to secure future infrastructure.
Usable Security Systems: Designing and evaluating user-centric security systems to ensure frictionless real-world application and high rates of enterprise adoption.
Blockchain & Distributed Systems: Developed secure, state-of-the-art distributed systems for complex enterprise applications, including IoT networks, supply-chain management, digital document storage, and verifiable trust frameworks.
Principal Research Strategist (TNK Quest)
Directing the overarching research and development strategy for the organisation, bridging advanced academic research with commercial cybersecurity product development, and serving as a key strategic advisor to the executive board.
Executive Leadership & Strategy:
Cross-Functional Leadership: Act as the Head of R&D, overseeing both the research and technical development divisions to ensure fluid communication, technical alignment, and seamless commercialisation across all business units.
Executive Advisory: Work directly alongside the Company Director and cross-functional Principals to provide high-level strategic direction on emerging cyber threats, security postures, and architectural resilience.
Funding & Strategic Growth: Drive institutional expansion by identifying opportunities, authoring proposals, and collaborating with external consortiums to secure major research grants and external funding.
Intellectual Property (IP) & Product Development:
Commercialising Research: Lead dynamic teams of elite researchers and developers to translate cutting-edge, peer-reviewed research into practical frameworks, commercial tools, and actionable enterprise products.
IP Generation & Governance: Spearhead the organisation's Intellectual Property portfolio, acting as the lead technical authority on authoring, documenting, and filing novel cybersecurity and AI patents.
Research Publication: Conduct and publish high-impact research to substantiate and support the company's research-rooted cybersecurity, AI, and human-centred security offerings.
Consulting & Executive Education:
Bespoke Industry Training: Oversee the design and delivery of highly specialised executive education and consulting services, including the development of bespoke training programmes, workshops, and courses for industry and government clients.
Founder & Principal Advisor
Founded and direct a cybersecurity consultancy dedicated to bridging the gap between advanced academic research, enterprise security, and industry capability. Provide high-level strategic advisory, threat intelligence, and bespoke educational frameworks to commercial and institutional clients.
Strategic Advisory & Risk Governance:
Board-Level Consulting: Provide overarching executive guidance on cybersecurity strategy, regulatory compliance, and incident response readiness to ensure robust enterprise resilience against sophisticated attack vectors.
Threat Intelligence & Market Analysis: Conduct in-depth market studies and risk landscape evaluations, delivering predictive threat modelling, competitive benchmarking, and tailored mitigation roadmaps to guide executive decision-making.
Strategic Consortiums & Academic Partnerships:
Industry-Academia Integration: Facilitate high-impact strategic partnerships, connecting enterprise businesses with leading academic institutions to drive joint cybersecurity research projects and technological innovation.
Talent Pipeline Development: Architect collaborative knowledge-sharing frameworks and structured internship pathways to transition cutting-edge academic theory into actionable commercial assets while developing the next generation of cyber talent.
Executive Education & Capability Uplift:
Curriculum & Infrastructure Design: Oversee the end-to-end architectural design of bespoke cybersecurity curricula, including advanced instructional resources, assessments, and hands-on technical laboratory environments for universities and institutions.
Enterprise Awareness Programmes: Drive organisational capability by designing and delivering tailored, industry-specific training workshops, embedding a highly secure, risk-conscious culture across corporate teams and executive boards.
Research Fellow (Next Generation Authentication Technologies)
Led the architectural design and applied research for next-generation identity and authentication frameworks, working at the intersection of government, academia, and enterprise to solve critical national security challenges.
Strategic Leadership & Governance:
Enterprise Project Leadership: Directed high-stakes authentication initiatives within the CyberCRC ecosystem, ensuring strategic alignment between advanced research outputs and commercial enterprise requirements.
Stakeholder Management: Facilitated continuous collaboration with industry partners and government stakeholders, translating complex cryptographic concepts into actionable project milestones and executive briefings.
Intellectual Property Management: Acted as the primary technical liaison with patent attorneys, authoring detailed invention disclosures and managing the end-to-end patent application process for novel identity and security technologies.
Authentication Architecture & Research Focus:
Ambient Intelligence (IoT) Authentication: Architected 'RAAISE', a robust framework for continuous, frictionless user authentication within smart environments using ambient sensor data.
Verifiable Digital Identity: Designed privacy-preserving, highly compliant Digital Credential Wallets (DCW) tailored for secure enterprise, citizen, and government applications.
Remote Identity Proofing: Pioneered advanced remote identity verification techniques to enhance security assurance, validate digital identities, and defend against sophisticated fraud vectors.
Usable Security & MFA: Evaluated and optimised Multi-Factor Authentication (MFA) systems to improve real-world usability, reduce friction, and drive high adoption rates across enterprise environments.
Lecturer (Faculty of Engineering and Information on Technology)
Tutor / Instructor (Faculty of Engineering and Information on Technology)
Led the architectural design of advanced cybersecurity curricula and deployed complex network simulation infrastructure, establishing a foundational bridge between academic research and practical, enterprise-grade security defence.
Infrastructure & Architectural Development:
Curriculum Architecture: Co-architected the Master of Cybersecurity programme and developed core curriculum from the ground up, including the highly specialised 'Digital and Cyber Crime' course.
Secure Sandbox Environments: Designed, built, and deployed complex, isolated virtual sandbox environments. This bespoke infrastructure enabled students to safely simulate advanced network attacks and practice zero-trust defence strategies in a highly controlled setting.
Academic Leadership & Mentorship:
Cohort Management: Directed academic cohorts and managed teaching staff, ensuring the seamless delivery of complex technical lectures and hands-on laboratory workshops.
Strategic Mentorship: Provided dedicated mentorship and technical guidance to PhD candidates and undergraduate students, elevating the overall research output and technical competency of the department.
Event Governance & Outreach:
Conference Leadership: Organised and facilitated major international cybersecurity events, serving as the Web Chair and Facility Coordinator for the IEEE TrustCom Conference (2017).
Technical Advocacy: Acted as an academic ambassador by running specialised introductory sessions, effectively translating complex cybersecurity frameworks into accessible concepts for prospective students and new audiences.
Academic Instructor (Information Technology / Information System)
Delivered specialised instruction in high-level information systems, IT infrastructure, and strategic governance to shape the next generation of enterprise IT professionals.
Architectural & Strategic Instruction:
Enterprise Architecture & Infrastructure: Directed comprehensive coursework on Enterprise Architecture, IT Infrastructure, and Systems Analysis and Design, effectively bridging theoretical frameworks with practical enterprise applications.
IT Governance & Risk Management: Facilitated advanced modules in IS Strategy Management and Acquisition, alongside IT Audit and Controls. Focused heavily on enterprise compliance, risk management protocols, and strategic technology procurement.
Information Systems & Data Management:
Systems Leadership: Led complex lectures and hands-on laboratory sessions covering Data and Information Management, Management Information Systems, and Project and Programme Communication Systems.
Technical Foundations: Provided foundational instruction in Programming and core Information Systems, ensuring academic cohorts developed robust, practical technical competencies.
Co-Founder & Director of Research & Development
Founded and directed an innovation-focused technology incubator, overseeing end-to-end research, product development, and the delivery of bespoke IoT and enterprise software solutions.
Executive Leadership & Strategy:
Corporate Governance: Directed all overarching R&D initiatives, managing technical workflows and overseeing the organisation's public relations and strategic talent acquisition.
Product Delivery: Bridged the gap between hardware engineering and software development to deliver complex, bespoke technology solutions for external stakeholders.
Architectural Projects & Infrastructure:
IoT & Mesh Network Architecture: Architected a comprehensive hardware and software ecosystem for automated high-speed event tracking. Deployed an interconnected network of proximity sensors across a physical mesh network to capture, relay, and process real-time telemetry data through a central control entity.
Enterprise Workflow Automation: Developed and deployed a secure, localised intranet portal to digitise and automate facility management workflows. The system provided secure access management, broadcast capabilities for administrative staff, and guaranteed service level agreements (SLAs) for end-user requests.
Software Engineering Intern (e-Governance Standards Division)
Software Engineering Intern (e-Governance Standards Division)
Contributed to critical e-Governance initiatives under the Department of Electronics and Information Technology, focusing on secure enterprise portals, standard compliance, and large-scale database integration for national infrastructure.
Enterprise Data & Portal Architecture:
Large-Scale Database Integration (2012): Designed and deployed a secure online portal to manage and provide authenticated access to a highly segregated database containing over one million geographical constituency records. Engineered robust backend infrastructure to ensure secure, high-availability access via national e-governance channels.
Full-Stack Development & Integration: Executed end-to-end full-stack development, rigorous system testing, and secure database setup using enterprise frameworks and confidential proprietary software.
Compliance & Secure Interface Design:
Standards-Compliant UI Frameworks (2013): Developed a dynamic Graphical User Interface (GUI) module strictly adhering to the government's 'Metadata and Data Standards Demographic Version 1.1'.
Secure Authentication & Validation: Engineered complex authentication workflows, implementing robust verification and data validation protocols to ensure highly secure data entry while optimising the end-user experience.
Software Engineering Intern (Computer Cell - Management Services Division)
Led the end-to-end development and integration of a highly secure, automated payroll architecture for a premier international trading enterprise under the Government of India.
Enterprise Workflow Automation & Security:
Secure Financial Architecture: Architected and deployed a comprehensive Secure Payroll Generation System, fundamentally modernising the organisation by replacing legacy manual workflows with an automated financial engine. The system streamlined the monthly generation, updating, and auditing of employee salary data and statutory reports.
High-Assurance Integration: Engineered secure data pipelines to facilitate the direct, authenticated transfer of highly sensitive payroll data to partnered financial institutions, achieving an exceptional 99.99% processing accuracy rate.
National Deployment: Successfully launched the overarching system across the central corporate headquarters and over ten major regional branches. This widespread adoption significantly improved operational efficiency, financial compliance, and data security using robust database management systems.
Doctor of Philosophy (Computer Systems)
Thesis: Adaptive Secure Network Model for Dynamic Wireless Mesh Networks
Architectural Focus: Designed and validated a comprehensive security framework for complex, distributed wireless environments. Engineered novel hybrid encryption and authentication schemes to optimise network performance while maintaining strict data integrity and high-assurance access controls.
Key Capabilities Built: Advanced Cryptography, Distributed Systems Security, Key Management Architecture, Secure Routing Protocols.
Bachelor of Technology (Computer Science & Engineering)
Thesis: ZAUBER (Advanced Gesture Recognition System)
Technical Focus: Engineered an advanced machine learning application leveraging OpenCV and the .NET framework to process complex visual data and translate physical patterns into actionable system commands.
Key Capabilities Built: Machine Learning, Pattern Recognition, Computer Vision, Core Software Engineering.
Distinguished Global Talent Alumni (2021): Awarded by the Australian Government for outstanding contributions to the national cybersecurity landscape.
Accelerated PhD Candidacy (2017): Awarded a direct conversion from Master of Science (Research) to Doctor of Philosophy based on exceptional research performance and significant contribution to the field.
Triple Top-Up Scholarship Recipient (2015, 2016, 2017): Awarded competitive university funding for sustained academic excellence throughout doctoral research.
First Prize, Inter-University Robotics Competition: Recognised for excellence in industry-applied research and engineering.
Member, Institute of Electrical and Electronics Engineers (IEEE)
Member, Association for Computing Machinery (ACM)
Member, Australian Information Security Association (AISA)
Member, Society of Automotive Engineers (SAE)
Serving as a technical authority and invited expert for leading global academic journals and international conferences, ensuring the integrity and advancement of next-generation cybersecurity frameworks.
Associate Editor: IEEE Bio-inspired Computing STC
Conference Leadership: Web Chair and Facility Coordinator, IEEE TrustCom, BigDataSE, and ICESS (2017)
Invited Technical Reviewer:
Cybersecurity & Identity: IEEE Transactions on Information Forensics and Security, Computers & Security, AISA CyberAustralia.
IoT & Infrastructure: ACM Transactions on Sensor Networks, IEEE Communications Standards Magazine, IEEE Communications Surveys and Tutorials, International Journal of Computer and Telecommunications Networking.
Advanced Computing: Future Generation Computer Systems, Journal of Supercomputing, Journal of Machine Intelligence and Signal Processing.
Mentorship: Technical Project Guide for senior academic cohorts and final-year engineering research initiatives.
Certified Ethical Hacking Expert (CEHE): TechDefence, IIT Bombay. Focused on advanced penetration testing methodologies and risk assessment frameworks.
Microsoft Certified Professional (MCP): Microsoft. Foundational certification in enterprise systems and platform management.
Microsoft Technology Associate (MTA): Microsoft. Early technical accreditation in information technology infrastructure.
Co-Founder, Adroit Explorer Innovation Chamber: Directed a technology incubator focused on fostering R&D and exploring emerging hardware/software integration.
President, Juvenile Care NGO (Gurgaon Chapter): Led regional operations for a non-profit dedicated to the support and education of underprivileged children.
Student Ambassador, EMC Academic Alliance Programme: Acted as a technical liaison between industry and academia to promote advanced data storage and cloud infrastructure education.
Robotics & Innovation: First Prize, Inter-University Robotics Competition (Industry-Applied Research).
Technical Advocacy: Facilitated professional workshops on Web-Server Deployment, Drupal Development, and Network Security fundamentals.
Architected and deployed enterprise-grade computational environments and networking stacks to support institutional R&D and advanced pedagogical requirements.
HPC Supercomputer & AI Modelling Cluster (2025)
Institution: Deakin University, Deakin Cyber Lab, Australia.
Architecture: Directed the end-to-end procurement and configuration of an HPE Supercomputer ecosystem integrated with TP-Link enterprise networking hardware.
Purpose: Developed the technical foundation for large-scale AI model validation and high-throughput cybersecurity data processing.
High-GPU Research Server (2020)
Institution: Deakin University, Blockchain Lab, Australia.
Architecture: Engineered a high-performance Supermicro server stack configured with significant GPU computational power.
Purpose: Custom-built to facilitate intensive cryptographic research and distributed ledger simulations.
Enterprise Network Stack & Simulation Testbed (2017)
Institution: University of Technology Sydney (UTS), Australia.
Architecture: Designed and deployed an extensive infrastructure comprising Supermicro HPC servers, dual Juniper Enterprise Switches, and 30 Juniper Gateway devices.
Legacy: Managed the environment through 2019; the architecture remains in active use as the primary teaching testbed for cybersecurity cohorts.
Security Architecture: Expert in the design and deployment of Intrusion Detection/Prevention Systems (IDS/IPS), Firewall Architecture, and Enterprise Security Policies.
Offensive Security: Advanced proficiency in the Metasploit Framework and penetration testing methodologies (CEHE).
Risk Governance: Specialised in comprehensive cyber risk assessment and technical vulnerability management.
Enterprise Networking: Advanced configuration and management of Juniper (JUNOS) and VyOs environments, including complex LAN/WAN switching and routing architectures.
Virtualisation & Cloud: Hands-on expertise in VMware, VirtualBox, and OpenStack for building scalable, isolated research and production environments.
Systems Engineering: Senior-level administration of Linux (Ubuntu, RedHat, Kali), UNIX, and Microsoft Windows ecosystems.
Software Engineering: Full-stack development capability across C, C++, C#, and VB.NET, with functional proficiency in Python, Java, and Shell scripting.
Data Management: End-to-end lifecycle management (installation, configuration, and optimisation) of MySQL and PostgreSQL database architectures.
Web Technologies: Advanced deployment of ASP.NET, PHP, and Drupal CMS environments, integrated with secure server configuration.
AI & Automation: Strategic integration of Large Language Models (LLMs) including Gemini and ChatGPT to augment R&D and operational workflows.
Specialised Systems: Hardware-software integration using Arduino and industrial engineering tools.