Cybersecurity professional focused on building secure systems through hands-on projects. My work spans vulnerability management, threat hunting, SIEM engineering, and compliance — turning security frameworks into actionable implementations.
- Building vulnerability management programs and automating remediations at scale
- Deploying and configuring cloud-native SIEMs with custom detection rules
- Conducting hypothesis-driven threat hunts using KQL and EDR telemetry
- Mapping security controls to NIST 800-53 and DISA STIGs for compliance readiness
- Developing incident response playbooks aligned with NIST and SANS frameworks
14 Projects · 7 Security Domains · 4 Languages · 5 Frameworks
| Project | Description |
|---|---|
| Vulnerability Management Program Implementation | End-to-end vulnerability management lifecycle — policy creation, stakeholder buy-in, Nessus scanning, risk-based prioritization, and remediation achieving 80% vulnerability reduction |
| Programmatic Vulnerability Remediations | Automated remediation scripts mapped to Tenable Plugin IDs and CVEs — SSL/TLS hardening, Telnet removal, and more |
| Project | Description |
|---|---|
| Azure Sentinel SIEM Lab | Cloud-native SIEM deployment with custom KQL analytics rules, SOAR playbooks, and MITRE ATT&CK-mapped detections |
| Active Directory Security Lab | AD deployment, attack detection (Kerberoasting, DCSync, Golden Ticket), and enterprise hardening with KQL queries |
| Project | Description |
|---|---|
| Threat Hunting Scenario — Tor Browser Usage | Hypothesis-driven threat hunt detecting unauthorized Tor installation and usage via Defender for Endpoint and KQL |
| Network Traffic Analysis Lab | Packet capture analysis with Wireshark/tcpdump — C2 detection, DNS tunneling, ARP spoofing, and Suricata IDS signatures |
| Project | Description |
|---|---|
| NIST 800-53 Compliance Mapping | Security control assessment and gap analysis using NIST SP 800-53 Rev 5 with POA&M development and risk scoring |
| Cloud Security Posture Assessment | Azure cloud security assessment against CIS Benchmarks v2.0 with prioritized remediation roadmap |
| STIG Implementation and Remediation | DISA STIG hardening for Windows systems — CAT I/II/III finding remediation and compliance documentation |
| Project | Description |
|---|---|
| Incident Response Playbook | Enterprise IR playbooks for malware, phishing, ransomware, brute force, insider threats — aligned with NIST 800-61 and SANS frameworks |
| Project | Description |
|---|---|
| Security Awareness Training Program | Enterprise awareness program with phishing simulations, role-based training, and metrics-driven reporting |
| Vulnerability Assessment Report Template | Professional assessment report template with executive summaries, risk scoring, and remediation roadmaps |
| Project | Description |
|---|---|
| Nessus Report Parser | Python CLI tool for parsing Nessus CSV exports into prioritized remediation reports with risk scoring and executive summaries |