Security analyst, also known as an ethical hacker. My expertise spans various domains, including reverse engineering, penetration testing, bug bounty hunting, and conducting red team exercises. As a security consultant, I closely collaborate with organizations to assess their systems and identify vulnerabilities before malicious actors can exploit them. My passion lies in safeguarding digital ecosystems through thorough analysis, solution-focused strategies, and ensuring operational security (OPSEC).
My journey in computer science has fueled a strong passion for cybersecurity, leading me to specialize in various aspects such as reverse engineering, penetration testing, and bug bounty hunting. Now, as an independent professional, I am eager to channel this expertise into the realm of security operations. Specifically, I am aiming to contribute to the cybersecurity field, where I can apply my skills to detect and respond to security incidents effectively.
Skill | Associated Project | Skill | Experiences Project | |
---|---|---|---|---|
SIEM Implementation and Log Analysis | Lab Environment | SQLi | Lab Environment | |
Network Traffic Monitoring and Attack Detection | Lab Environment | SIEM - Azure Sentinel :: Honeypot | Lab Environment | |
Security Automation with Shuffle SOAR | Lab Environment | Active Directory Environment in Azure | Lab Environment | |
Incident Response Planning and Execution | Lab Environment | File Integrity Monitor (FIM) | Lab Environment | |
Case Management with TheHive | Lab Environment | Vulnerability Management | Lab Environment | |
Scripting and Automation for Threat Mitigation | Lab Environment | REST API | Lab Environment | |
Sandbox | Lab Environment | |||
Endpoint protection | Lab Environment | |||
Password Generator | Lab Environment |
- Vulnerability Assessment and Management: Nessus, OpenVAS, QualysGuard, Rapid7 Nexpose
- Penetration Testing: Metasploit Framework, Burp Suite, Nmap, Wireshark
- Network Security Monitoring (NSM): Snort, Suricata, Zeek (formerly Bro)
- Intrusion Detection and Prevention Systems (IDPS): Snort, Suricata, Security Onion, OSSEC
- Endpoint Security: Symantec, McAfee, Carbon Black, CrowdStrike
- Security Information and Event Management (SIEM): Splunk, QRadar, LogRhythm, ArcSight
- Data Loss Prevention (DLP): Symantec, McAfee, Digital Guardian, Forcepoint
- Web Application Security: OWASP ZAP, Acunetix, AppScan, Netsparker
- Encryption and Cryptography: OpenSSL, GnuPG, VeraCrypt, BitLocker
- Password Management and Authentication: LastPass, KeePass, Okta, Duo Security
- Detection Lab
- SOC Automation Project