You can connect with me on:
I am a Security Engineer specializing in Application Security and Cloud Security. I work on penetration testing, vulnerability assessment, and secure code review to identify and address security gaps before they can be exploited. I have experience securing diverse infrastructures for multiple clients, applying practical and effective strategies to protect systems and data. I also develop automation solutions that make security processes faster, more consistent, and easier to manage.
Over the last six years, I have worked in IT, building various web applications to solve real-world problems in sectors such as Education Technology (EdTech), eCommerce, Real Estate, multi-vendor solutions, and Human Resource applications. I enjoy creating solutions that work and help both the business and the customers they serve. Time management is crucial to me, and I ensure all projects are delivered within the agreed timeframe. In the summer of 2024, I began transitioning into cybersecurity with the Google Cybersecurity Certificate program, building on my IT experience. Since then, I have worked on different projects and earned a couple of certificates that make me stand out.
Here are key skills I've developed, showcased through projects I've worked on.
| Skill | Project Link |
|---|---|
| Incident Handling and Reporting | Phishing Incident Response and Alert Ticketing |
| Conducting Security Audit | Controls and Compliance Checklist |
| Incident Report Analysis | Incident Report Analysis |
| Linux File Permissions | File Permissions in Linux |
| SQL Query Optimization and Filtering | Apply Filters to SQL Queries |
| Python Programming and Automation | Algorithm for File Updates in Python |
| SOC Incident Analysis and Response | SOC Hands-On Project - LAB 1 & LAB 2 |
| Malware Analysis and Response | SOC Hands-On Project - LAB 1, Scenario 6 |
| Reverse Shell Detection and Analysis | SOC Hands-On Project - LAB 1, Scenario 9 |
| Data Breach Notification Handling | SOC Hands-On Project - LAB 2, Exercise 1 |
| Phishing Email Response | SOC Hands-On Project - LAB 2, Exercise 2 |
| Ransomware Incident Management | SOC Hands-On Project - LAB 2, Exercise 4 |
| IAM (Identity and Access Management) | IAM |
Here are some of the tools I'm proficient with:
Here are the certifications I've earned, reflecting my commitment to advancing my expertise and staying current in the cybersecurity field.
- Phishing Incident Response and Alert Ticketing
- Controls and Compliance Checklist
- Incident Report Analysis
- File Permissions in Linux
- Algorithm for File Updates in Python
- Apply Filters to SQL Queries
- Lab 1_Scenario 1: Investigating Unauthorized Changes using Wazuh
- Lab 2_Scenario 2: Investigating Suspected Command Execution using Wazuh
- Lab 3_Scenario 3: Investigating Reconnaissance Activities using Wazuh
- Lab 4_Scenario 4: Investigating Unauthorized Access Attempts using Wazuh
- Lab 5_Scenario 5: External Attack Against a Webserver using Wazuh
- Lab 6_Scenario 6: Malware Detection, Analysis, and Response using Joe Sandbox Cloud
- Lab 7_Scenario 7: Researching Suspicious Historical Events using Wazuh
- Lab 8_Scenario 8: Investigating Data Exfiltration Activity using Wireshark
- Lab 9_Scenario 9: Detection and Analysis of Reverse Shell Traffic using Wireshark
- Exercise 1: Data Breach Notification by an External Party
- Exercise 2: Responding to a Phishing E-mail Storm
- Exercise 3: Client-Side Attack -
- Exercise 4: Ransomware Defense and Ransom Payment Decision
- Exercise 5: Responding to a Missing Laptop Incident
- Network-Based Firewall using pfSense
- Simulation of Network Attack, Defense, and Incident Response
- Phishing Campaign Setup with Gophish
- Endpoint Security Monitoring with Wazuh SIEM
- Configuring and Deploying SentinelOne for Enterprise Endpoint Protection
- Endpoint Security Monitoring: Integrating Wazuh SIEM with SentinelOne EDR for Windows Systems
- Deploying Keycloak for Identity and Access Management (IAM) for Wazuh
- AutoCTI: Automated Threat Intelligence Summarizer & Slack Notifier using article source, VirusTotal, AbuseIPDB and IDR
- Atlantis Setup in Docker with AWS Lightsail
- Leveraging SpiderFoot for Offensive and Defensive OSINT Operations