Founded Green Dwarf Tech to deliver secure tech solutions and services. Leading all management works, web developement, and cyber security. Focused on performance, privacy, and reliability for businesses.
Founder & CEO
Cyber Security Specialist
Ethical Hacker
Penetration Tester
Web Developer
Entrepreneur
Founder & CEO
Cyber Security Specialist
Ethical Hacker
Penetration Tester
Web Developer
Entrepreneur
Hello! I’m Rubhak A.
A cybersecurity enthusiast. The founder & CEO of Green Dwarf Tech. Passionate about penetration testing, web development, software development and contribution to open-source tools.
I create fast, secure, and mobile-friendly websites tailored for businesses and e-commerce, using modern tech to ensure performance and reliability.
I offer reliable, secure hosting with performance optimization, SSL, backups, and uptime monitoring—perfect for businesses that value speed and security.
I identify and fix security flaws through in-depth vulnerability assessments and ethical hacking—helping businesses stay protected against real-world threats.
I deploy and automate web applications tailored to your needs, ensuring smooth, scalable, and efficient operations with minimal manual effort.
Founded Green Dwarf Tech to deliver secure tech solutions and services. Leading all management works, web developement, and cyber security. Focused on performance, privacy, and reliability for businesses.
CISO at Green Dwarf Tech, leading cybersecurity across web development and infrastructure with privacy-by-design and zero-trust principles. Oversee risk management, threat modelling, compliance, server deployments, and penetration testing for reliable business systems.
Provided web development and ethical hacking services for clients across industries. Delivered static and dynamic websites, conducted security audits, and helped businesses strengthen their digital footprint.
Pursuing a B.Tech in CSE with a specialization in Software Product Engineering through Kalvium’s industry-integrated program. Gaining hands-on experience in full-stack development, real-world problem solving, and agile product building from day one.
Completed Class 12 with a focus on Computer Science, building a strong foundation in analytical and technical skills.
Completed Class 10 with distinction, developing core knowledge across mathematics, science, and technology.
Gained foundational skills in Microsoft Azure security, threat protection, encryption, compliance, and Microsoft Defender/Sentinel for incident response.
Progressing through hands-on labs in penetration testing, vulnerability management, and SC-900 exam prep to strengthen cloud security operations (ongoing).
Learnt an in-depth program covering key cybersecurity domains including threat intelligence, network security, incident response, and SIEM tools. Gained hands-on experience with IBM QRadar, Linux, and key frameworks like NIST and MITRE ATTACK.
Completed a comprehensive program covering security operations, network security, system hardening, incident response, and SIEM tools. Developed hands-on skills using Linux, Python, and security frameworks aligned with industry best practices.
Mastered Red Hat Enterprise Linux administration on IBM Power Systems, including LPAR partitioning, PowerVM virtualization, OpenShift deployment, and IBM PowerVC private cloud orchestration. Applied hands-on skills in command-line operations, storage/networking configuration, performance tuning, and secure enterprise infrastructure management.
Mastered advanced Nmap techniques for network scanning, reconnaissance, and enumeration. Gained in-depth knowledge of scanning types, firewall evasion, OS detection, and real-world recon strategies used in penetration testing.
Certified in identifying, prioritizing, and managing security exposures across hybrid environments. Gained practical skills in continuous threat exposure management (CTEM), attack path analysis, and proactive risk mitigation.
Gained practical experience in securing digital banking systems, responding to cyber incidents, and managing customer data privacy. Focused on tasks like phishing analysis, risk mitigation, and internal policy review within a financial services environment.
Participated in simulations focused on securing IT infrastructure and handling cyber incidents. Tasks included analyzing potential threats, drafting security policies, and implementing preventive strategies in a corporate environment.
Completed tasks simulating client-facing cybersecurity consulting, including risk identification, vulnerability assessment, and reporting. Gained insights into how PwC helps organizations manage and respond to evolving cyber threats.
Worked on practical scenarios involving threat detection, incident response, and vulnerability assessment. Gained exposure to how Datacom approaches cybersecurity challenges for enterprise clients across various sectors.
Engaged in real-world simulations focused on securing banking systems and protecting customer data. Tasks included assessing phishing threats, analyzing security breaches, and applying risk mitigation strategies in a financial services context.
Completed real-world cybersecurity tasks including threat modeling, policy development, and risk analysis. Gained insight into how AIG protects sensitive financial data and manages security operations within a global insurance framework.
Gained hands-on experience in identifying and analyzing cybersecurity threats within a global payment network. Tasks included monitoring network activity, conducting risk assessments, and developing incident response strategies. Learned how Mastercard ensures data protection and system resilience in high-scale environments.
Developed hands-on skills in writing and automating shell scripts for Linux environments. Covered topics like variables, loops, conditionals, functions, and task automation essential for system administration and DevOps workflows.
Learned advanced techniques for securing Windows environments, including user access control, system hardening, auditing, and threat detection. Focused on real-world practices for securing endpoints and enterprise Windows infrastructures.
Gained foundational knowledge in digital marketing strategies, including SEO, SEM, social media, email marketing, and analytics. Explored how digital tools are used to reach and engage target audiences effectively.
Learned the fundamentals of AI, including machine learning, neural networks, and data-driven decision making. Developed an understanding of how AI is transforming industries and how to apply ethical AI solutions in business contexts.
Who this is for: Owners of local shops, consultancies, or e-com sites who think “I’m too small to hack.”What you’ll…
Who this is for: Small business owners, freelancers, or agencies who want zero surprises on launch day.What you’ll learn: My…
In today’s digital-first world, even small vulnerabilities in a website can be exploited to devastating effect. Whether you’re a startup…
Most businesses assume they aren’t targets for cyberattacks. That assumption is wrong. In reality, small and mid-sized businesses are increasingly…
© 2025 Green Dwarf Tech. All rights reserved.