DOMAIN: PWNPRONE.COM / OPERATOR: PINPWN

KUSHAGRACHOUDHARY

┌─ OPERATOR STATUS ───────┐
LOCATIONGurugram, IN
ROLEPrincipal Engineer
COMPANYAttackFence TechLabs
STATUS[ ACTIVE ]
└────────────────────┘
Cybersecurity Board Advisory, Enterprise Threat Hunting, Strategic Cyber Resilience, OT Security Leadership

SUBJECT_PROFILE / CASE_FILE

// AUTHENTICATED_BY_OPERATOR: CHIEF

KC-REF: 1337-01
Kushagra Choudhary - Principal Cybersecurity Engineer and Product Leader
ID_IMG: 001
SUBJECT:Kushagra Choudhary
HANDLE:pinpwn
CLASSIFICATION:Principal Engineer & Product Lead
YEARS ACTIVE:13
SPECIALISATION:Threat Detection · Strategy · Product
FIELD OPS:
Product Strategy
Policy Dialogue
Confidential Event

I started hacking in 9th grade - because I wanted to know how systems break. That curiosity never left.

Thirteen years later I architect threat detection infrastructure, own security products from first principles to market, and have been in the rooms where it matters - IR war rooms, international conference stages, national cybersecurity policy tables, and C-suite discussions on product strategy and market direction.

"My work sits at an intersection most people choose one side of: deep engineering and operational leadership. I chose both."

0
Years
Active
0+
Products
Built
0
Company
Every function

OPERATIONAL_HISTORY / FIELD_RECORD

Tracing system lineage across 13 years

NODE_INACTIVE
NODE_ACTIVE

AttackFence TechLabs

Gurugram, HR
// Dynamic startup specialising in creating threat detection products in enterprise environments and at scale.
RECORD_ID: AF-01
STATUS: VERIFIED

Principal Engineer & Product Lead

AttackFence TechLabs · Apr 2022 – Present

MITRE ATT&CKNetwork SecurityOT Security
Impact Summary:

"Engineered automated correlation of disparate alerts into unified, actionable attack narratives."

Detailed Operational Logs:
  • Architected an incident correlation engine using graph-based threat detection leveraging Markov models, tightly mapped to MITRE ATT&CK, stitching alerts across third-party EDR, NDR, and SIEM into complete attack-cycle narratives.
  • Architect and product owner of an OT security threat detection platform built on MITRE ATT&CK for ICS and MITRE D3FEND, defining architecture, research roadmap, and GTM.
  • Owned the full product lifecycle: vision, sprint planning, team hiring, and daily execution, reporting directly to the CTO.
  • Led IR engagements for Fortune 500 and publicly listed entities and supported commercial outcomes through presales and solution architecture.
RECORD_ID: AF-02
STATUS: VERIFIED

Senior Software Development Engineer

AttackFence TechLabs · Jul 2021 – Apr 2022

Endpoint SecurityThreat IntelData Warehouse
Impact Summary:

"Achieved 87% reduction in storage and 300% improvement in search latency through database modernization."

Detailed Operational Logs:
  • Led development of a proprietary agentless endpoint threat detection platform built for high-throughput environments.
  • Drove company-wide database modernization: evaluated Cassandra, MongoDB, CouchDB, and Parquet against production requirements.
  • Deployed an internal Threat Intelligence platform, selecting and customising open-source tooling to consolidate external feeds.

ACPL Systems Pvt. Ltd.

Gurugram, HR
// Largest SI and cyber security service player in India, with a 3-decade old legacy.
RECORD_ID: AC-01
STATUS: VERIFIED

Software Development Engineer

ACPL Systems Pvt. Ltd. · Jul 2019 – Jul 2021

Windows InternalsThreat HuntingCassandra
Impact Summary:

"Reduced Mean Time to Detect (MTTD) by 60% through automated hunting pipelines."

Detailed Operational Logs:
  • Reduced MTTD from 30 to 12 minutes (60%) via automated agentless threat hunting in Windows environments and GPO-driven telemetry pipelines.
  • Migrated stack from MySQL to Apache Cassandra, achieving a 42% query performance gain and 32% execution speed improvement.
RECORD_ID: AC-02
STATUS: VERIFIED

Consultant - Cybersecurity Software Engineer

ACPL Systems Pvt. Ltd. · Jun 2018 – Jul 2019

Kernel LKMSecurity AutomationVAPT
Impact Summary:

"Improved team productivity by 60% via automated cross-vendor threat response integration."

Detailed Operational Logs:
  • Built a unified integration layer across NGFW, IPS, SIEM, and load balancers (Palo Alto, Check Point, F5); automated threat response policies.
  • Built a host-based firewall for Linux kernel v2.6.32.69 as a Loadable Kernel Module (LKM), working directly with the sk_buff network stack.
  • Mentored new engineers in VAPT and Red Teaming, accelerating onboarding and raising team capability.

AttackFence TechLabs operates as the product R&D sister concern of ACPL Systems.

EXP_LOG_001
RECORD_HISTORY

OPEN_SOURCE

┌─ OPERATION:

ATTACKAXIS

[ACTIVE]
CLASSIFICATION:OPEN SOURCE
STACK:Python · MITRE ATT&CK · STIX · Threat Detection

High-fidelity adversarial simulation engine. Generates realistic SOC telemetry from MITRE ATT&CK STIX data. Includes stateful breach tracks and 50+ false-positive scenarios. SIEM-ready export (CEF, LEEF, JSONL, Syslog).

┌─ OPERATION:

JETFOLIO

[ACTIVE]
CLASSIFICATION:PROTOTYPE
STACK:LLM · System Design · Finance · Risk Analysis

LLM-powered portfolio intelligence system. Tracks investment themes and dynamic risk exposure against real-time geopolitical and macroeconomic context. Automated sentiment analysis on global news feeds.

ENGAGEMENTS

FIELD_EVIDENCE // 005_FILES
DEFENCE SECTOR WAR ROOM
ID_E1
INDO-SINGAPORE STRATEGIC MEETING
ID_E2
NASSCOM KEYNOTE
ID_E3
CISO LEADERSHIP FORUM
ID_E4
STRATEGIC RISK PANEL
ID_E5
Cybersecurity Capabilities, Threat Detection Skills, Incident Response Expertise, OT Security Leadership, Product Strategy, Cloud Security, SIEM Architecture

ARSENAL / CAPABILITY_MATRIX

Python
C/C++
Assembly
PowerShell
Bash
MITRE ATT&CK
D3FEND
YARA
Sigma Rules
STIX/TAXII
Incident Response
Wazuh
Suricata
Sysmon
SIEM/SOAR
EDR/NDR/XDR
Event-Driven Design
Microservices
Kernel/Userspace
Zero Trust
Apache Kafka
Spark
Vector
MQTT
Apache Cassandra
Parquet
DuckDB
MongoDB
Azure
AWS
Docker
GitHub Actions
Grafana
Elasticsearch
Kibana
Logstash
SYSTEM_CAPABILITIES: 36
STATUS: MATRIX_OPTIMIZED
Hire Principal Cybersecurity Engineer, Contact Security Product Lead, Consulting Cybersecurity Expert
OPEN_CHANNEL / INITIATE_CONTACT

Ready for the next operation?

Whether it's a hard engineering problem, a product that needs building, or a threat that needs understanding. If the work is interesting, I'm interested.

SYSTEM_ACCESS

Download Technical Dossier

Get a comprehensive PDF summary of operational history, capability matrix, and technical certifications.

DOWNLOAD_CV_001.PDF
CHANNEL_OPERATIONAL
Global Inbound Latency:

Encryption active. Inbound signals are prioritized based on technical complexity and strategic alignment.

KC