Cybersecurity labs, forensic analysis, and security research
Developed an automated Python-based forensic analysis pipeline that processes digital evidence and generates comprehensive forensic reports. Integrates with Autopsy, bulk_extractor, and custom parsing scripts.
Designed and implemented custom intrusion detection rules using Suricata and Snort. Analyzed network traffic for anomalies and malicious patterns. Created alert escalation procedures and incident response workflows.
Performed comprehensive penetration testing on a vulnerable web application. Identified OWASP Top 10 vulnerabilities including SQL injection, XSS, CSRF, and authentication flaws. Provided detailed remediation recommendations.
Conducted detailed forensic analysis of Windows systems including MFT analysis, Event Log investigation, registry analysis, and user activity reconstruction. Recovered deleted files and identified malicious artifacts.
Performed static and dynamic malware analysis on samples in isolated lab environment. Documented malware behavior, identified command & control indicators, and created comprehensive threat analysis reports.
Built and maintained a complete network security lab environment using GNS3 and VirtualBox. Implemented VLANs, routing protocols, firewalls, and IDS/IPS systems for testing and learning.
Senior Capstone Project
Designed an end-to-end automated incident response system that detects, analyzes, and responds to security incidents in a lab network. Integrated threat intelligence feeds, automated triage, and documented case tracking.
Digital Forensics II
Conducted forensic analysis on mobile devices including iOS and Android platforms. Extracted data, recovered deleted artifacts, and created comprehensive forensic documentation of device activity.
Security Operations Center Lab
Deployed and configured SIEM system for centralized log management and threat detection. Developed custom correlation rules and created security dashboards for real-time monitoring.
Vulnerability Assessment & Remediation
Implemented a complete vulnerability management lifecycle including scanning, assessment, prioritization, remediation tracking, and compliance reporting for a lab network.
Ethical Hacking & Penetration Testing
Executed full penetration testing engagement following NIST methodology. Performed reconnaissance, scanning, enumeration, exploitation, and reporting on simulated corporate network.
Incident Response & Crisis Management
Participated in tabletop exercises simulating major security incidents. Practiced incident response procedures, communication protocols, and decision-making under pressure.
I'm open to discussing my projects, collaborating on security research, or exploring opportunities in cybersecurity.
Let's Discuss