Welcome to my cybersecurity portfolio. This space highlights my hands‑on work in threat analysis, vulnerability scanning, and system hardening. I focus on practical skills and solving problems.
About Me I’m a cybersecurity student building real experience through labs, projects, and continuous learning. I enjoy breaking down security issues and finding straightforward, effective solutions.
Professional Skill Categories
Skills
- Basic to advance communication
- Threat analysis
- Vulnerability scanning
- Basic incident response
- Network and system hardening
- Log review and SIEM fundamentals
- Many more...
Tools
- Wireshark
- Nmap
- Splunk
- Nessus
- Linux utilities
Frameworks & Playbook Reasearch
- NIST
- CIS Controls
- MITRE ATT&CK
Systems Administration & Cloud Infrastructure
- Multi-Cloud Platforms: Hands-on experience with Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
- Virtualization: Deploying and managing Virtual Machines (VMs) across Azure, AWS, and Google Compute Engine; proficient with Oracle VMware and Hyper-V.
- Cloud Admin: Managing cloud-based resources, identity access (IAM/Azure AD), and virtual networking.
- Apple Ecosystem: macOS Enterprise Administration, Apple Business Manager (ABM), MDM procedures, and macOS troubleshooting/deployment.
- Operating Systems: Windows 10/11/ & Legacy's, Kali Linux, macOS, and Server environments.
Software Development & Data Science
- Programming Languages: Python (IDLE 3.10), SQL, Angular (Web Framework).
- Data Analysis & Visualization: Tableau, Google Colab, IBM Analyst Notebook, Microsoft Access (Relational Databases).
- Development Environments (IDEs): Visual Studio Code (VS Code), PyCharm Community, Spyder-IDE, Git Bash.
Enterprise Administration
- Microsoft Admin Tools: Expert in Microsoft 365 Admin Center, Active Directory (AD), and SharePoint Administration.
- Security & Compliance: Utilizing DISS/JPAS for personnel security and Bitlocker/Okta for endpoint and identity protection.
- Workflow: Managing team productivity and technical debt using Jira and Microsoft Teams.
Digital Investigation Skills
- All‑Source & OSINT Research: Skilled in collecting, validating, and correlating information from open sources, public datasets, and digital footprints to build accurate intelligence assessments.
- Use of Public Investigation Tools: Experienced with widely available OSINT platforms such as Shodan, Censys, Maltego, SpiderFoot, OSINT Framework, and other open‑source investigative utilities.
- Privacy‑Focused Project Work: Many projects cannot be displayed due to confidentiality, but they demonstrate strong analytical methods, ethical investigation practices, and secure handling of sensitive findings.
Secure Communications & Team Mangement
- Professional experience with mIRC, Rocket Chat, Surfchat, Intranet, Microsoft Teams Manager, and SharePoint Manager.
Below is my current progress. These are the projects I’m studying and developing as part of my learning journey:
Projects
- Research Projects
- SIEM log analysis
- Network traffic investigations and Network Build CISCO
- Security configuration reviews
- Programimng and EDM Mod
Certifications
-
- Google:CyberSecurity Professional
- Others
-
College
- ICOHS - Cyber Security Specialist 2025.
My Goal: To keep growing as a security professional and build strong, practical skills that support safe and resilient systems.
Professional Goal: To achieve a Master’s degree and beyond while evolving alongside the rapidly advancing AI landscape. I am focused on bridging the gap between theoretical security and practical AI implementation to create safer, more adaptive systems.To keep growing as a security professional and build strong, practical skills that support safe and resilient systems.