At a Glance

Cyber Skills

This project showcases comprehensive cybersecurity expertise gained from National Cyber League (NCL) challenges. I developed custom scripts for HMAC verification and steganography analysis. It involved OSINT, cryptography, and forensics, solving complex security tasks.

First specification list goes here​
Second specification list here​
Third specification list goes here​
And another one goes here​
Dark atmospheric chess game showcasing strategic play, emphasizing intelligence and strategy.

Investigation

I led a comprehensive security breach investigation at Nexora Dynamics. This identified a sophisticated attack involving spear-phishing and data exfiltration across multiple systems. Root cause analysis revealed vulnerabilities , leading to targeted security posture recommendations.

First specification list goes here​
Second specification list here​
Third specification list goes here​
And another one goes here​
Close-up of hands typing on a laptop displaying cybersecurity graphics, illuminated by purple light.

Forensic Report

For this project, I performed a detailed forensic investigation on a hard drive image. The case specifically related to the illegal sale, trade, or purchase of owls. I then meticulously created a comprehensive forensic report, detailing all relevant findings and evidence for the case.

First specification list goes here​
Second specification list here​
Third specification list goes here​
And another one goes here​
analysis, analytics, business, charts, computer, concept, data, desk, device, diagram, digital, documents, graphs, information, investment, job, management, marketing, modern, office, report, business, business, data, data, data, data, data, information, investment, investment, management, marketing, marketing, marketing, report, report, report

ELK Stack

This project involved deploying an ELK (Elasticsearch, Logstash, Kibana) stack and a Damn Vulnerable Web Application (DVWA) in Azure. I successfully set up load-balanced DVWA across three servers, configuring a jump box to provide secure SSH access without direct server exposure.

First specification list goes here​
Second specification list here​
Third specification list goes here​
And another one goes here​
Person analyzing stock market data on a laptop at a desk.