Advanced phishing URL detection system with real-time analysis and visual reporting. Uses machine learning algorithms to identify malicious links and protect users from cyber threats.
Advanced evidence collection and deep-dive forensic analysis to uncover hidden traces and support high-impact incident response.
Comprehensive offensive security assessments, from vulnerability discovery to exploit development, ensuring systems are battle-tested.
Proactive SOC operations, combining threat hunting, alert triage, and rapid response to neutralize advanced cyber threats.
Cutting-edge vulnerability research and exploit analysis to stay ahead of adversaries in an evolving threat landscape.
Exposure to international cybersecurity frameworks and real-world attack scenarios.
From offensive security to incident response, I bridge both red and blue team domains.
Delivered security assessments, incident investigations, and hands-on lab projects with measurable results.
Not just identifying threats — but neutralizing, documenting, and hardening against them.
Advanced phishing URL detection system with real-time analysis and visual reporting capabilities.
Comprehensive network reconnaissance tool for port scanning and device discovery.
Encrypted password manager with advanced security features and breach monitoring.
Digital evidence collection and analysis tool for incident response and investigations.
Threat intelligence gathering and analysis platform for proactive security monitoring.
Automated vulnerability scanner with detailed reporting and remediation guidance.
Currently training as a Cyber Security Incident Response Analyst, gaining hands-on experience in incident handling, log analysis, vulnerability management, and digital forensics while developing skills in reporting, threat briefs, and security labs focused on attack preparedness.
Linux Red Hat Administration, covering RH124 & RH134 with hands-on experience in Linux system administration, troubleshooting, and server management.
Let's discuss how I can help protect your organization from cyber threats and enhance your security posture.