Skip to content
DupedByte logo

About

Sagnik Chakraborty

I am an M.C.S. student in Computer Science at the University of Illinois Urbana-Champaign (expected May 2027) with a B.S. in Computer Engineering (May 2025). I build secure systems that hold up under operational pressure, focusing on security engineering, DevSecOps, and infrastructure reliability.

At Cognizant, I designed and unit-tested HL7 FHIR data mapping workflows and shipped secure Azure DevOps pipelines with Snyk-based vulnerability detection. At SIGPwny, I manage ESXi platforms for 100+ users, deploy CTF infrastructure on GKE, and co-founded the Purple Team, including STARVE, an automated embedded attack simulation platform.

My work also spans applied ML and security analytics, from depth-aware neural style transfer to intrusion detection and stream-processing systems. I am growing toward security leadership roles, with long-term goals of founding a cybersecurity consulting firm or serving as a CISO.

Principles

  • Embed security into delivery and measure risk reduction.
  • Automate the repeatable work with reliable pipelines and runbooks.
  • Design for production constraints and adversarial thinking.
  • Share what I learn so teams can move faster.

Toolbox

PythonGoC/C++TypeScriptAzure DevOpsKubernetesTerraformDockerGKEESXiProxmoxSnyk

Highlights

Designed and tested HL7 FHIR data mapping workflows and secured CI/CD delivery at Cognizant with Azure DevOps and Snyk.

Managed SIGPwny infrastructure (ESXi, GKE) for 100+ users and co-founded the Purple Team for attack/defense exercises.

Built STARVE, an automated embedded attack simulation platform for MITRE eCTF, reducing manual testing.

Built depth-aware neural style transfer with evaluation across 1,000 outputs and worked on intrusion detection and stream-processing systems.

Working with me

  • I prefer evidence-based security with instrumented pipelines and repeatable checks.
  • I turn ambiguity into runbooks, automation, and tooling that scales people.
  • I communicate with concise docs, diagrams, and measurable outcomes.
  • I am always open to security and infrastructure collaborations; reach out via email or LinkedIn.