I'm a cybersecurity professional with hands-on experience in identity and access management (IAM), vulnerability management, email security, and endpoint protection. I build and document real-world security projects to sharpen my skills and share knowledge with the community.
Security Domains:
Identity & Access Management Vulnerability Management Threat Hunting Threat Intelligence Honeypot Deployment Email Security Endpoint Protection SIEM
Deployed and documented a fully operational Cowrie SSH/Telnet honeypot on a hardened AWS EC2 instance. Captures real-world brute-force attacks, attacker session recordings, and malware download attempts. Includes a real-time Flask web dashboard, CLI log analyzer, and automated setup scripts.
AWS Python Flask Cowrie UFW Fail2ban Systemd
End-to-end implementation of a vulnerability management program — from asset discovery and scanning through prioritization, remediation tracking, and reporting. Documents the full lifecycle using industry frameworks.
Vulnerability Management Risk Prioritization Remediation
PowerShell and Bash scripts for automating common vulnerability remediations. Reduces manual effort and improves consistency across endpoints.
PowerShell Bash Automation Remediation
Threat hunting scenario investigating unauthorized Tor browser usage on a corporate network. Documents the hypothesis, detection methodology, log analysis, and findings.
Threat Hunting SIEM Log Analysis Network Security
A collection of threat intelligence reports analyzing real-world threat actors, malware campaigns, and emerging attack techniques. Each report follows a structured intelligence format.
Threat Intelligence OSINT Malware Analysis
Open to security engineering roles, consulting, and collaboration. Feel free to reach out!