Jaiman Sharma - Security-minded software engineer who automates everything possible|

Bachelor of Computing (Honours) @ Queen's with focuses in (Cybersecurity + AI). Cloud Security Intern at Sectra AB (Jun–Aug 2025, Mississauga, ON). I build reliable, automated systems and I like breaking them (responsibly) to understand risk.

Cloud SecurityPython / LinuxDocker / KubernetesAppSec + TestingCTF / Reverse EngineeringBinary Exploitation

Cloud Security

Assessing deployment workflows and platform compatibility through automation

Systems + Dev

Building testable, containerized applications with automated CI/CD pipelines

Security Research/CTF

Practical web security, reverse engineering, binary exploitation, threat modeling

Automation

Finding repetitive tasks and writing scripts/apps to streamline workflows and processes

Experience

Sectra AB

Cloud Security Intern

// Jun 2025 – Aug 2025
  • Assessed software compatibility with Kubernetes, Falco, and Kyverno to identify integration and deployment risks.
  • Researched and evaluated security and deployment tools for potential in-house adoption, analyzing feasibility, security impact, and alignment with existing systems.
  • Delivered technical presentations to Technology and Cloud Security teams, strengthening cross-team knowledge sharing and backend change preparedness.

Tech: Kubernetes · Falco · Kyverno · Cloud security · Linux

QMIND x Technical Management Group Ltd

Design Team Member

// Sept 2025 – Present
  • Contributed to a 5-person team building an automation system to standardize contractor CVs for a mining/energy consulting firm, reducing manual formatting time from 40 minutes to 2 minutes per CV.
  • Implemented components of a processing pipeline integrating PDF and LinkedIn data extraction with GPT-4 and LangChain to produce structured JSON outputs.
  • Collaborated using GitHub workflows, code reviews, and issue tracking to deliver a client-ready automation solution aligned with stakeholder requirements.

Tech: Python · LangChain · GPT-4 · PDF/LinkedIn data extraction · GitHub workflows

Queen's Cryptography and Cyber Security Club (Q3C)

Executive & CTF Specialist

// Sept 2024 – Present
  • Compete in national and international Capture-the-Flag competitions with a focus on cryptography, web exploitation, and binary exploitation.
  • Achieved top-50 finishes out of ~1,000 teams by developing and deploying custom exploit scripts.
  • Collaborate with an 8-person team to analyze vulnerabilities, share tactics, and mentor new members on reverse engineering tools.

Projects

Don AI Assistant

Browser Extension

What it is: A lightweight browser extension that supports day-to-day residence-don workflows (drafting responses, generating consistent messaging, summarizing content) using the OpenAI API.

Why it matters: Designed for speed and consistency - turn common repetitive writing tasks into a reliable flow while keeping tone professional and context-aware.

JavaScriptbrowser extension APIsOpenAI APIprompt designbasic privacy-minded handling

Library Management System

Full-Stack + DevOps/Quality Focus

What it is: A library catalog/management system with an emphasis on correctness, testing, and deployment hygiene.

Why it matters: Building features alongside automated testing, containerization, and CI/CD so changes are easy to validate and ship.

Engineering angle: Reproducible environments, predictable releases, test coverage, and clear separation of concerns.

Flask (Python)SQLDockerCI/CDautomated tests

Skills

Languages

PythonJavaC++CJavaScriptSQLBashHaskell

Security & Analysis

GhidraBurp SuiteWiresharkBinary Exploitation

Infra & DevOps

DockerKubernetesCI/CDLinuxAzure

Engineering Practices

TestingAutomationClean APIsReproducible BuildsDocumentation

I prefer tooling that improves reliability: repeatable builds, automated checks, and clear interfaces. I support automating whatever I can.

About

I'm a Bachelor of Computing (Honours) student at Queen's University (2023-2027) focused on cybersecurity and AI, and I've been on the Dean's List from 2023-2025. One of my primary draws to programming was the efficiency of automation - building software that fully encapsulates a task and its related data can make a real impact on systems today. I like work that sits at the intersection of secure engineering and systems thinking, building software that's testable, deployable, and resilient by design. In practice, that means I'm comfortable moving between development and security: writing Python services, containerizing apps, setting up automated CI/CD pipelines, and using security tooling to find and explain risk. I support automating whatever I can, believing that well-designed automation reduces human error and frees up time for higher-level problem-solving. Beyond coding, I enjoy playing strategy and long-term games, as well as repairing and tinkering with technologies to refurbish and repurpose them for sale or my own use. I'm currently looking for internships, research roles, and early-career opportunities where I can contribute quickly while learning from strong engineering and security teams.

CTFs & Writeups

🔒

CTF writeups and challenges coming soon.

Check back for detailed walkthroughs of binary exploitation, reverse engineering, and web security challenges.

Contact

Let's connect.

If you're hiring for internships, research roles, or early-career software/security positions, I'd love to chat.

Email me