👋 About Me
I’m passionate about cybersecurity and always eager to explore different areas within the field. Funny enough, my journey began when my own LinkedIn account got hacked - lol, that’s a story for another time!
Currently, I’m diving deep into Cloud, AI, and their integration with security to build a secure CI/CD pipeline. I’m focused on threat modeling and automating that process by integrating LLM models in the workflow. This project will take a while but it’s my goal for the year.
Also recently, I’ve developed an interest in defensive side of the security like securing infrastructure and detecting anomalies. One of my goals this year is to build an AI-powered tool/pipeline to automate SOC workflows and detect unusual patterns in logs and infrastructure.
And yeah of course, I enjoy offensive security as well and I can say I have strong fundamental holding there. I love solving CTF challenges and hacking machines on platforms like Hack The Box (HTB) and TryHackMe (THM). I really like API testing, exploring OWASP Top 10 vulnerabilities, and digging into business logic flaws during web app pentests. Burp-~
- I am coming for you next….
🎓 Education
Graduate Certificate in Cloud Engineering
💼 Work Experience
🛠️ Technical Skills
Category | Skills & Tools |
---|---|
Languages | Python, x86/x64 Assembly, Bash, PowerShell, Shell Scripting, JavaScript, SQL, C/C++ |
Domain | AD Management, Incident Response, Threat Modelling, System Design, OWASP, Reverse Engineering, Cryptography, Risk Management |
Security Practices & Methodologies | SCA, SAST, DAST, TCP/IP, EDR, Network Security |
Operating Systems | Windows, Linux, MacOS, mint Linux (best) |
Cloud & DevSecOps | AWS, Azure, GCP, Docker, Jenkins, Git, Microservices, Terraform, Kubernetes, argoCD |
Penetration Testing |
|
Tools | Burp Suite, Ghidra, Autopsy, Frida, Cobalt Strike, mimikatz, MobSF, OWASP ZAP, x64Dbg, IDS/IPS, Nessus, Nmap, Wireshark, Snort, Splunk, Elastic, Microsoft Sentinel, Zeek (Bro) |