About
I’m a dedicated cybersecurity expert with a passion for protecting organizations from evolving cyber threats. I specialize in Security Operations Centers (SOCs), red teaming, blue teaming, and vulnerability assessments. My work focuses on detecting, mitigating, and strengthening security defenses, while continuously honing my skills through Capture the Flag (CTF) challenges. I’m always learning and exploring new cybersecurity trends to help businesses safeguard their sensitive data.
Work Experience
Red-Teaming
Blue-Teaming
Dev-SecOps
Cloud
Check out my latest work
I've worked on a variety of projects, from simple websites to complex web applications. Here are a few of my favorites.
Repository Watchtower is a comprehensive file integrity monitoring tool designed to safeguard critical files and directories by detecting, tracking, and reporting changes in real-time. It provides robust features like content modification detection, file creation and deletion tracking, and renaming alerts, all customizable through an advanced filtering system that allows monitoring based on file extensions, size, and directory inclusion or exclusion. With real-time email notifications, detailed logging, and CSV export capabilities.
A comprehensive platform designed to streamline and manage judging processes for competitions, events, or evaluations. This system includes features like judge registration, participant scoring, criteria-based evaluations, and result generation. The user-friendly interface ensures seamless management for administrators, judges, and participants alike, while robust back-end functionality ensures accuracy and reliability.
Ideas Immortalized in Print
Writing research papers has been one of the most fulfilling parts of my journey. Each paper represents countless hours of diving deep into complex topics, questioning existing ideas, and exploring innovative solutions.
- D
Deep learning Approach for Shrewd Intrusion Detection System
Jbiet, Moinabad
This paper explores the implementation of a deep learning-based Intrusion Detection System (IDS) designed to proactively identify and mitigate cybersecurity threats. By leveraging advanced neural networks, the proposed solution demonstrates enhanced accuracy in detecting anomalies and unauthorized activities across networks. The systems intelligent architecture adapts to evolving threat landscapes, offering a scalable and efficient approach to modern cybersecurity challenges.
Get in Touch
Want to chat? Just shoot me a dm with a direct question on LinkedIn and I'll respond whenever I can. I will ignore all soliciting.