Jaiman Sharma - Security-minded software engineer who automates everything possible|
Bachelor of Computing (Honours) @ Queen's with focuses in (Cybersecurity + AI). Cloud Security Intern at Sectra AB (Jun–Aug 2025, Mississauga, ON). I build reliable, automated systems and I like breaking them (responsibly) to understand risk.
Cloud Security
Assessing deployment workflows and platform compatibility through automation
Systems + Dev
Building testable, containerized applications with automated CI/CD pipelines
Security Research/CTF
Practical web security, reverse engineering, binary exploitation, threat modeling
Automation
Finding repetitive tasks and writing scripts/apps to streamline workflows and processes
Experience
Sectra AB
Cloud Security Intern
- •Assessed software compatibility with Kubernetes, Falco, and Kyverno to identify integration and deployment risks.
- •Researched and evaluated security and deployment tools for potential in-house adoption, analyzing feasibility, security impact, and alignment with existing systems.
- •Delivered technical presentations to Technology and Cloud Security teams, strengthening cross-team knowledge sharing and backend change preparedness.
Tech: Kubernetes · Falco · Kyverno · Cloud security · Linux
QMIND x Technical Management Group Ltd
Design Team Member
- •Contributed to a 5-person team building an automation system to standardize contractor CVs for a mining/energy consulting firm, reducing manual formatting time from 40 minutes to 2 minutes per CV.
- •Implemented components of a processing pipeline integrating PDF and LinkedIn data extraction with GPT-4 and LangChain to produce structured JSON outputs.
- •Collaborated using GitHub workflows, code reviews, and issue tracking to deliver a client-ready automation solution aligned with stakeholder requirements.
Tech: Python · LangChain · GPT-4 · PDF/LinkedIn data extraction · GitHub workflows
Queen's Cryptography and Cyber Security Club (Q3C)
Executive & CTF Specialist
- •Compete in national and international Capture-the-Flag competitions with a focus on cryptography, web exploitation, and binary exploitation.
- •Achieved top-50 finishes out of ~1,000 teams by developing and deploying custom exploit scripts.
- •Collaborate with an 8-person team to analyze vulnerabilities, share tactics, and mentor new members on reverse engineering tools.
Projects
Don AI Assistant
Browser Extension
What it is: A lightweight browser extension that supports day-to-day residence-don workflows (drafting responses, generating consistent messaging, summarizing content) using the OpenAI API.
Why it matters: Designed for speed and consistency - turn common repetitive writing tasks into a reliable flow while keeping tone professional and context-aware.
Library Management System
Full-Stack + DevOps/Quality Focus
What it is: A library catalog/management system with an emphasis on correctness, testing, and deployment hygiene.
Why it matters: Building features alongside automated testing, containerization, and CI/CD so changes are easy to validate and ship.
Engineering angle: Reproducible environments, predictable releases, test coverage, and clear separation of concerns.
Skills
Languages
Security & Analysis
Infra & DevOps
Engineering Practices
I prefer tooling that improves reliability: repeatable builds, automated checks, and clear interfaces. I support automating whatever I can.
About
I'm a Bachelor of Computing (Honours) student at Queen's University (2023-2027) focused on cybersecurity and AI, and I've been on the Dean's List from 2023-2025. One of my primary draws to programming was the efficiency of automation - building software that fully encapsulates a task and its related data can make a real impact on systems today. I like work that sits at the intersection of secure engineering and systems thinking, building software that's testable, deployable, and resilient by design. In practice, that means I'm comfortable moving between development and security: writing Python services, containerizing apps, setting up automated CI/CD pipelines, and using security tooling to find and explain risk. I support automating whatever I can, believing that well-designed automation reduces human error and frees up time for higher-level problem-solving. Beyond coding, I enjoy playing strategy and long-term games, as well as repairing and tinkering with technologies to refurbish and repurpose them for sale or my own use. I'm currently looking for internships, research roles, and early-career opportunities where I can contribute quickly while learning from strong engineering and security teams.
CTFs & Writeups
CTF writeups and challenges coming soon.
Check back for detailed walkthroughs of binary exploitation, reverse engineering, and web security challenges.
Contact
Let's connect.
If you're hiring for internships, research roles, or early-career software/security positions, I'd love to chat.
Email me