Projects

Hands-on security work showcasing real skills.

Screenshot of a detailed SIEM dashboard analyzing network logs.
Screenshot of a detailed SIEM dashboard analyzing network logs.
Threat Hunt

Tracked suspicious activity using ELK stack.

Visual of malware analysis report with code snippets.
Visual of malware analysis report with code snippets.
Malware

Dissected malware to reveal attack methods.

Network traffic graph highlighting IDS alerts.
Network traffic graph highlighting IDS alerts.
Cloud security dashboard showing GCP Watchtower alerts.
Cloud security dashboard showing GCP Watchtower alerts.
Network

Reviewed IDS logs to spot intrusions.

Cloud

Monitored GCP environments for threats.

Gallery

Snapshots from hands-on projects and real-time threat hunts

Screenshot of a live ELK dashboard showing real-time log analysis with highlighted anomalies
Screenshot of a live ELK dashboard showing real-time log analysis with highlighted anomalies
Visual of network traffic patterns captured during an IDS/IPS review session
Visual of network traffic patterns captured during an IDS/IPS review session
Example of an AI-driven threat detection alert integrated into a cloud security platform
Example of an AI-driven threat detection alert integrated into a cloud security platform
Detailed malware analysis report snippet showcasing behavioral insights and mitigation steps
Detailed malware analysis report snippet showcasing behavioral insights and mitigation steps
Diagram of an Active Directory attack simulation used for vulnerability assessment training
Diagram of an Active Directory attack simulation used for vulnerability assessment training