I build hands-on cybersecurity projects that mirror how security operates in enterprise environments. My work focuses on vulnerability management, threat hunting, and security operations, with an emphasis on governance, risk-based decision making, and controlled execution.
These projects demonstrate how vulnerabilities are identified, validated, prioritized, remediated, and verified within real-world constraints such as change management, SLAs, and operational risk.
- Vulnerability Management Program Implementation
- Programmatic Vulnerability Remediations (PowerShell and BASH)
- Threat Hunting Scenario (Tor Browser Usage)
- Threat Hunting Incident: Publilc Facing IP Detection
- Building KQL Maps for Data Visualiztion and Trend Spotting