Connect with me.
Check out my progress and accomplishments on TryHackMe โ ranked in the top 2%.
My hands-on projects showcasing practical skills across multiple cybersecurity domains.
Fundamental security skills: securing remote access, network traffic analysis, cloud monitoring, and application security.
| Focus Area | Project |
|---|---|
| SSH Hardening (Fail2Ban, UFW, KeyAuth, Tailscale) | Enhancing SSH Security |
| Network Traffic Analysis (Wireshark) | Malicious Packet Analysis |
| Cloud Honeypot Monitoring (Azure Sentinel) | Azure SOC Honeypot |
| Web Application Firewall Configuration | SafeLine WAF on DVWA |
| APT & Cyber Kill Chain Investigation (Splunk) | APT Investigation |
Detecting and responding to credential attacks, malicious scripts, and anomalous user activity using Azure Sentinel.
| Focus Area | Project |
|---|---|
| Brute-Force & Credential Stuffing Detection | Brute-Force Alert Rule |
| PowerShell Suspicious Activity | PowerShell Suspicious Web Request |
| Impossible Travel Anomaly Detection | Geo-Location Anomaly Detection |
Advanced threat hunting using Microsoft Defender for Endpoint and Kusto Query Language (KQL).
| Focus Area | Project |
|---|---|
| Multi-Stage Attack Investigation | The Great Admin Heist CTF |
| Public-Facing IP & Brute-Force Detection | Public Facing IP Detection |
| Internal Network Slowdown Investigation | Network Slowdowns Incident |
| Insider Threat & Data Exfiltration | Data Exfiltration by Employee |
Scanning and remediating vulnerabilities and applying security baselines.
| Focus Area | Project |
|---|---|
| Vulnerability Scanning & Remediation (Tenable) | Nessus Scan & Remediation |
| STIG Account & Authentication Hardening | Secure Authentication STIGs |
| STIG Audit Policy Configuration | Audit Policy Enforcement STIGs |
| STIG Disabling Insecure Features | System Hardening STIGs |
Core cybersecurity principles and frameworks from Googleโs Cybersecurity Professional training.
| Focus Area | Project |
|---|---|
| Risk Assessment & Security Audits | Risk Management Lab |
| File Permissions & Access Controls | File Permissions Lab |
| SQL Injection Filters | SQL Filtering Lab |
| Vulnerability Assessment (NIST SP 800-30) | Vulnerability Assessment Lab |
| Network Packet Capture Analysis | Network Analysis Lab |
| Incident Handling Documentation | Incident Handler Journal |
| Threat Modelling (PASTA Framework) | PASTA Worksheet |
Hereโs a look at the tools Iโve worked with and have experience using.
A list of my certifications, which can be verified by clicking the associated button.
View All 17+ Certifications on LinkedIn
First-Class Honours Degree in Business Studies (BA)
Nottingham Trent University