top of page

Projects

Ronak Nambiar excels in developing innovative solutions for cybersecurity and IT infrastructure. His expertise in building Formula race cars for Vizion Racing demonstrates his ability to blend technology and engineering. With a focus on physical and online hacking, he designs robust firewalls, tests Wi-Fi vulnerabilities, and masters ethical hacking platforms. As an Eagle Scout, Ronak brings leadership and innovation to every project.

Homelab & Cybersecurity Projects

  • Built a Proxmox cluster for penetration testing and server management to simulate advanced IT environments.

  • Designed and tested firewalls to analyze Wi-Fi vulnerabilities and enhance network security.

  • Conducted hardware penetration testing and explored ethical hacking using platforms like HackTheBox and TryHackMe.

Proxmox-VE-5-node-Cluster-on-PhoenixNAP-

Vizion Racing

IT Head, Vizion Racing

  • Led IT infrastructure and team management for a student-led initiative to build a Formula race car from scratch.

  • Designed and launched a fully functional website to showcase the team's progress and manage outreach efforts.

  • Developed a new-generation steering wheel integrating a Teensy 4.1 microcontroller to control rotary encoders, an analog dial, and button-based engine start functionality.

  • Implemented Arduino programming to optimize car systems, including brake bias control with servos and dynamic engine modes via DIP switches.

  • Worked collaboratively with team leads on CAD design, electrical systems, and overall project execution.

Wheel.jpg

Research on Physical security

  • Lack of advanced access systems (e.g., RFID, biometrics).

  • Poor visitor sign-in enforcement.

  • Camera blind spots and outdated CCTV.

  • Delayed lockdowns and few drills.

  • Undertrained or understaffed security.

  • Improve access, surveillance, communication, and training.

computer-security_edited.png

Research on Operating Systems Hardening

  • Identified and analyzed critical vulnerabilities in Windows and Linux environments.

  • Created a detailed PDF report summarizing findings and recommendations.

  • Developed and delivered a PowerPoint presentation for stakeholders.

  • Implemented Windows and Linux hardening techniques to mitigate identified risks.

  • Strengthened overall system security and reduced exposure to potential threats.

What-is-Encrypting-File-System-2-1_edite

Rose awareness about Cyber security threats

  • Highlights risks of phishing, malware, and weak passwords.

  • Simplifies key cybersecurity tips for easy understanding.

  • Promotes secure habits like 2FA and regular updates.

  • Increases awareness of social engineering tactics.

  • Encourages reporting of suspicious activities.

  • Builds a proactive culture to prevent cyber threats.

360_F_472181971_ZCXWPAgsA2Yp6kEUhkSQDLvL
bottom of page