Network Security Monitoring [YOUTUBE]
Configured Security Onion to analyze and mitigate harmful events, utilizing various tools to extract pertinent information for comprehensive threat analysis and resolution.
Emerging cybersecurity advocate, inexperienced yet relentlessly driven to secure our digital frontier
Welcome to my corner of the web—where threats meet their match.
"The only true wisdom is in knowing you know nothing." - Socrates
Configured Security Onion to analyze and mitigate harmful events, utilizing various tools to extract pertinent information for comprehensive threat analysis and resolution.
Implemented failover for OS clusters using iSCSI disks, ensuring uninterrupted operations during system failures for seamless transition between clustered operating systems.
Implemented VPN technologies, Cloud integration and Software Defined Networking (SDN-Technology) to establish a comprehensive infrastructure, facilitating the merging of disparate networks across multiple countries and enhance routing efficiency and ensure efficient data delivery throughout the expansive network.
An Online Teaching Platform based on university guidelines and Standard. Developed an online teaching platform meeting university standard with a security-first approach.
ID: BEP7X5T55NF1QNC7
Obtained Date: November 13, 2024
Expiry Date: November 13, 2027
ID: 1898797
Obtained Date: February 01, 2024
Expiry Date: January 31, 2027
ID: 5QA5R56W2JC8
Obtained Date: July 03, 2020
Expiry Date: NONE
Cybersecurity enthusiast by day, digital detective by night—because let’s be honest, the internet never sleeps. Armed with a Bachelor’s in Information & Technology, dual majors in Cybersecurity, and a stack of certifications (CompTIA Security+, (ISC)² Certified in Cybersecurity, and more), I live for securing networks, analyzing threats, and catching vulnerabilities before the bad guys do.
I speak fluent Python, Java, and C++. My toolkit includes everything from IDS/IPS to Security Onion, and I’m well-versed in industry frameworks like MITRE ATT&CK and NIST CSF. Whether it's incident response, forensics, or keeping digital assets in check, I thrive on solving complex security puzzles.
Collaboration and mentorship keep me motivated—because what's the fun in cybersecurity if you can’t share the paranoia? Always learning, always adapting, and always two steps ahead of a cyber threat (hopefully).
"To strive, to seek, to find, and not to yield." - Alfred Lord Tennyson from UlyssesView My Resume!
Feel free to reach out to me on any of the platforms below or drop me an email. Let's connect!