Featured Projects

Automated Forensic Analysis Pipeline

Developed an automated Python-based forensic analysis pipeline that processes digital evidence and generates comprehensive forensic reports. Integrates with Autopsy, bulk_extractor, and custom parsing scripts.

Objective: Automate routine forensic tasks and reduce analysis time
Tools Used: Python, Autopsy, bulk_extractor, Pandas
Key Features: Automated file extraction, timeline generation, artifact analysis
Outcome: Reduced manual analysis time by 60%, improved accuracy and documentation
Digital Forensics Python Automation

Network Intrusion Detection System

Designed and implemented custom intrusion detection rules using Suricata and Snort. Analyzed network traffic for anomalies and malicious patterns. Created alert escalation procedures and incident response workflows.

Objective: Detect and respond to network-based threats in real-time
Tools Used: Suricata, Snort, Wireshark, ELK Stack
Key Features: Custom rule development, traffic analysis, log aggregation
Outcome: Successfully detected 50+ attack signatures in lab environment
IDS/IPS Network Security Threat Detection

Web Application Security Assessment

Performed comprehensive penetration testing on a vulnerable web application. Identified OWASP Top 10 vulnerabilities including SQL injection, XSS, CSRF, and authentication flaws. Provided detailed remediation recommendations.

Objective: Identify web vulnerabilities before deployment
Tools Used: Burp Suite, OWASP ZAP, Metasploit, Python
Key Findings: SQL Injection (Critical), XSS (High), Missing Security Headers
Outcome: Generated professional penetration test report with remediation roadmap
Penetration Testing Web Security Vulnerability Assessment

Windows Forensics Analysis Lab

Conducted detailed forensic analysis of Windows systems including MFT analysis, Event Log investigation, registry analysis, and user activity reconstruction. Recovered deleted files and identified malicious artifacts.

Objective: Master Windows forensic investigation techniques
Tools Used: FTK, Autopsy, Registry Explorer, EVTX Parser
Analysis Areas: File system, Registry, Event Logs, Timeline Analysis
Outcome: Created comprehensive forensic report with evidence documentation
Digital Forensics Windows Analysis Evidence Recovery

Malware Analysis & Reverse Engineering

Performed static and dynamic malware analysis on samples in isolated lab environment. Documented malware behavior, identified command & control indicators, and created comprehensive threat analysis reports.

Objective: Understand malware behavior and capabilities
Tools Used: IDA Pro, Wireshark, Cuckoo, VirtualBox
Analysis Type: Static and Dynamic Analysis, C&C Communication Tracking
Outcome: Identified malware family characteristics and propagation methods
Malware Analysis Reverse Engineering Threat Intelligence

Network Security Lab Environment

Built and maintained a complete network security lab environment using GNS3 and VirtualBox. Implemented VLANs, routing protocols, firewalls, and IDS/IPS systems for testing and learning.

Objective: Create realistic environment for security testing and research
Infrastructure: GNS3, VirtualBox, Kali Linux, Ubuntu, pfSense
Components: Routers, Firewalls, Web Servers, IDS/IPS, SIEM
Outcome: Fully functional lab for penetration testing and incident response simulation
Network Security Lab Setup Infrastructure

Academic & Coursework Projects

Capstone: Automated Incident Response Pipeline

Senior Capstone Project

Designed an end-to-end automated incident response system that detects, analyzes, and responds to security incidents in a lab network. Integrated threat intelligence feeds, automated triage, and documented case tracking.

Python SIEM Automation

Mobile Device Forensics Analysis

Digital Forensics II

Conducted forensic analysis on mobile devices including iOS and Android platforms. Extracted data, recovered deleted artifacts, and created comprehensive forensic documentation of device activity.

Autopsy Cellebrite Mobile Forensics

SIEM Implementation & Monitoring

Security Operations Center Lab

Deployed and configured SIEM system for centralized log management and threat detection. Developed custom correlation rules and created security dashboards for real-time monitoring.

Splunk/ELK Log Analysis Dashboards

Vulnerability Management Program

Vulnerability Assessment & Remediation

Implemented a complete vulnerability management lifecycle including scanning, assessment, prioritization, remediation tracking, and compliance reporting for a lab network.

Nessus OpenVAS Qualys

Penetration Testing Methodology

Ethical Hacking & Penetration Testing

Executed full penetration testing engagement following NIST methodology. Performed reconnaissance, scanning, enumeration, exploitation, and reporting on simulated corporate network.

Metasploit Nmap Burp Suite

Incident Response Tabletop Exercise

Incident Response & Crisis Management

Participated in tabletop exercises simulating major security incidents. Practiced incident response procedures, communication protocols, and decision-making under pressure.

IR Procedures Communication Leadership

Interested in Collaboration?

I'm open to discussing my projects, collaborating on security research, or exploring opportunities in cybersecurity.

Let's Discuss