17-year-old Cybersecurity Student
- Blue Team: SIEM (Elastic/Wazuh), IDS/IPS (Suricata/Snort), Threat Hunting, SOC Operations
- Pentesting: Web app vulnerability assessment, OWASP Top 10
- Malware Analysis: REMnux/FlareVM, Static/Dynamic Analysis, Reverse Engineering
- Security Engineering: CI/CD Security Automation (Nessus), MFA/PAM, hardening
- Tools:
Burp Suite
Nmap
Wireshark
pfSense
Python
Bash
PowerShell
Automation
OWASP ZAP
-
Synkro - Enterprise SIEM Implementation
Built Elastic Stack on Kubernetes for threat detection, reducing incident response time through automated workflows.
(Elasticsearch, Logstash, Kibana, MITRE ATT&CK) -
Cybersecurity Home Lab
SOC-like environment with pfSense (network segmentation), Active Directory attacks, and SIEM correlation rules.
(Kali Linux, Windows Server 2019, Wazuh) -
Malware Analysis Sandbox
Reverse-engineered malware samples using REMnux/FlareVM and identified IOCs through behavioral analysis.
(IDA, Ghidra, Wireshark)
- Technical Diploma in IT (System Analysis & Computing) - 2025
- CompTIA Security+ - Expected 2025
- Pentesting: Mastering web and network exploitation techniques
- Reverse Engineering: Ghidra/IDA Pro
- Exploit Development: Crafting custom exploits
- Open-Source: Building and contributing to pentesting tools
- Threat Intelligence: MISP platform integration
I'm actively looking to:
- Participate in CTF competitions (HackTheBox, TryHackMe)
- Contribute to open-source security tools (Pentesting tools, SIEM integrations, detection rules)
- Collaborate on malware analysis/research projects
📫 Contact me:
I'm actively looking to collaborate on projects.
- → Email: dev.matheustheodoro@gmail.com