Reyyan Ahmed

About

Security engineer, full-stack builder, and open source contributor who works across domains.

Philosophy
“The best way to understand a system is to build one, and then try to break it.”

I work across cybersecurity, full-stack engineering, and AI/ML. Not to spread thin, but because each domain strengthens the others. Security research informs how I architect. Building products deepens how I think about attack surfaces.

What drives me is building things that work in production. Systems that handle real data, serve real users, and solve meaningful problems. I care about craft and impact in equal measure.

Domains
Cybersecurity & AppSec

Vulnerability research, Android security, WebView exploitation, red team engagements, reverse engineering.

Full-Stack Engineering

Next.js, React, PostgreSQL, TypeScript. Production platforms with real users and complex system design.

AI / ML & LLM Systems

LLM fine-tuning on NVIDIA DGX hardware, competitive ML (Numerai), multi-model deliberation engines.

Open Source

Active contributor with merged PRs across major open-source projects.

Bug Bounty

HackerOne reporter. Targets include major Indian and global platforms.

Developer Tooling

CLI frameworks, npm-published packages, terminal UIs with Ink and Commander.js.

Timeline
Sep 2025 — Present
Associate Security Engineer, C3iHub, IIT Kanpur
  • ·Spearheaded a cybersecurity research vertical on a multi-million dollar national security project — defining technical strategy, scoping deliverables, and driving execution across the mobile threat research domain.
  • ·Engineered an end-to-end mobile ██████████████████ pipeline — architecting the tooling, building infrastructure, and delivering production-grade capabilities across multiple Android versions and OEM stacks.
  • ·Designed the technical hiring framework from scratch — structuring assessments, defining evaluation criteria, and building recruitment pipelines that scaled the team from the ground up.
  • ·Built a comprehensive threat intelligence knowledge base covering nation-state adversaries — thinking like a product owner about data architecture, access patterns, and long-term maintainability.
  • ·Authored foundational Android internals research spanning multiple OS generations, creating institutional knowledge that shaped the team's technical direction and research priorities.
  • ·Transitioned from intern to full-time contributor; consistently operated with founder-level ownership — identifying gaps before they were assigned and shipping solutions that unlocked the next phase of the project.
Mar 2025 — Sep 2025
Security Engineer Intern, C3iHub, IIT Kanpur

Joined the team as an intern and immediately started thinking beyond assigned tasks — identifying systemic gaps in mobile and network attack surfaces, proposing end-to-end solutions, and building tooling that the team adopted. Treated every problem like it was my company's problem to solve.

Aug 2024 — Feb 2025
Research Intern, IIT Kanpur

Architected the security research strategy for an EV cybersecurity project from the ground up — scoping threat models, designing red team playbooks, and building detection systems. Operated with full ownership: no hand-holding, no waiting for direction.

2024 — Present
Independent Builder

Shipped 7 production platforms: Nucleus, Guardian-X, 1drive.tech, QTRL, PolyMind, Jury AI, and more.

2024 — Present
Bug Bounty Hunting

4 vulnerability reports on HackerOne across major programs. Focus: Android APK analysis and WebView exploitation.

Oct 2021 — Jul 2025
Thapar Institute of Engineering & Technology

Bachelor's degree in Computer Engineering. Research focus on Android physical access vectors and application security.

2019 — Present
Android Security Research

Researching physical access red team vectors since class 10th. Threat intelligence on APT groups across nation-states.

Hardware

MacBook Pro M4 Pro · 48 GB RAM · 2 TB Storage