Parshva Doshi
- Galway, Ireland (open to relocate)
- MSc Cybersecurity Risk Management - University of Galway
- Certified Ethical Hacker (CEH)
- eJPT
- Currently preparing for OSCP
- Stamp 1G
Socials
About me
Hey, I’m Parshva! I recently completed my MSc in Cybersecurity Risk Management at the University of Galway. I’m really passionate about penetration testing, vulnerability assessment, and threat detection. I’ve had the chance to work on some cool VAPT engagements and build ML-based security tools during my studies and internships. In my spare time I play CTFs on HackTheBox and TryHackMe and do some bug bounty hunting on the side. I’ve got my CEH and eJPT and I’m currently grinding toward the OSCP. 😊
Core Skills: Burp Suite · Nessus · Nmap · Wireshark · Splunk · Ghidra · Python · Bash · AWS · GCP · Docker · Kubernetes · OWASP Top 10 · Linux
📍 Based in Galway and open to roles anywhere in Ireland!
Latest Posts
BSides Galway 2026 CTF: Intro [Web] WriteUp
18/03/2026BoardLight [HTB] — Writeup
17/09/2025Latest Projects
✉️ EmailAlexis
01/02/2024🔗 MaliceSpotter
01/02/2024Work Experience
TK Maxx, Galway, Ireland
Retail AssociateFrontline control responsibilities including maintenance, markdown, fitting rooms, receiving and processing, and cash office operations.
Hacktify Cybersecurity, Mumbai, India
Cyber Security InternPerformed web app penetration testing against OWASP Top 10 vulnerabilities (XSS, SQLi, CSRF, SSRF, IDOR). Produced detailed technical reports per task and conducted OSINT research and phishing analysis.
Zuvius Lifesciences Pvt Ltd, Mumbai, India
Full Stack & Cybersecurity InternStarted as a Full Stack intern building an Inventory Management System using ReactJS, MongoDB, NodeJS, and ExpressJS. Transitioned into a Cybersecurity role conducting VAPT using Burp Suite and Nessus, delivering staff awareness training, and building MaliceSpotter — a phishing detection tool with 90%+ accuracy, deployed on AWS.
Pristine Infosolutions Pvt Ltd, Mumbai, India
Cybersecurity Analyst TraineeInvestigated cybercrime cases, conducted reverse engineering analysis of WannaCry ransomware using Ghidra, and collaborated on CTF challenges.