I'm Ahmad Ansar, a freshman at Wentworth studying cybersecurity. I interned at State Street, placed 2nd in SkillsUSA, and spend my time building things and figuring out how they work and how they break. I'm new to this field, but I'm all in.
Real tools built from scratch. Security first, every time.
Real-world security work, not just coursework.
The same engine inside KeyVault, running live. Your input is analyzed server-side and never stored or logged.
Freshman at Wentworth. New to the field, but I take it seriously.
I'm a B.S. Cybersecurity student at Wentworth Institute of Technology in Boston, heading into my sophomore year. I graduated high school early through an Early College program, which is how I ended up at WIT at 18. Before starting, I interned at State Street in cybersecurity and placed 2nd in the SkillsUSA District Cybersecurity Competition.
I'll be straight about where I am: I'm new to this field and I'm still learning a lot. But I read before I build, I try to understand why things work the way they do, and I take security seriously. The projects on this page are real, built from scratch. This summer I'm studying for my CompTIA Security+.
I also founded the Cybersecurity Club at Quincy High School, was selected as one of 12 students statewide for the Massachusetts Alliance for Early College Advisory Council, and received the Ned V. Mannai Memorial Scholarship for academic achievement and community involvement. I work hard. That part I'm confident about.
Data is only accessible to authorized users. In KeyVault, the master password never touches the vault file. A derived key does. That distinction is not academic, it is the whole model.
Data is not tampered with undetected. Fernet's authentication layer means any bit-flip in the ciphertext causes an explicit failure, not silent garbage output. That matters.
Systems stay up under pressure. The Traffic Flood lab showed exactly how availability collapses under a flood and how rate limiting, SYN cookies, and ingress filtering restore it.
Open to internships, research opportunities, and security-focused work.