I'm a passionate Master's degree student diving deep into the exciting world of Cybersecurity! With a profound love for technology and a knack for tackling complex problems, I thrive on turning challenges into innovative solutions.
My journey in managing digital transformation projects and conducting cybersecurity assessments has fueled my passion for cybersecurity. I am now eager to transition into this field, specifically aiming to become an Information Security Analyst.
Project | Description | Tools Used |
---|---|---|
Network Analysis with Wireshark | Conducted in-depth network analysis using Wireshark to assess security across the 7 OSI layers, identifying and mitigating network threats like ARP poisoning, ICMP floods, TCP SYN flood attacks, SSL stripping, and SQL injection. | Wireshark, Network Protocols, TCP/IP |
Threat Modeling with MITRE ATT&CK Framework | Applied the MITRE ATT&CK framework for effective threat modeling and identifying cyber threats. Enhanced detection and mitigation strategies using threat intelligence. | MITRE ATT&CK, Threat Intelligence |
Project | Description | Tools Used |
---|---|---|
SOC Automation with Shuffle SOAR | Led an automation project to integrate security tools and streamline incident response using Shuffle SOAR. Built automated workflows to accelerate detection and resolution of security incidents. | Shuffle SOAR, Security Orchestration, Automation, Incident Response |
Windows Firewall Configuration & Security Log Monitoring | Configured Windows Firewall for internal network security. Regularly analyzed security logs to identify and mitigate potential risks. | Windows Firewall, Security Logs, Monitoring Tools |
Project | Description | Skills Used |
---|---|---|
Security Awareness Training at eToro | Led company-wide security awareness training on social engineering attacks. Focused on teaching employees how to identify phishing attacks and other manipulation techniques. | Security Awareness, Social Engineering Prevention, Employee Training |
Project | Description | Skills Used |
---|---|---|
Policy Creation & Compliance Management | Developed and reviewed Acceptable Use Policies (AUP) for remote access and ensured compliance with internal security standards and regulatory requirements. | Compliance, Policy Development, Risk Management |
PCI DSS Compliance & Security Assessments | Conducted security assessments focused on PCI DSS compliance, guiding organizations in aligning their processes with industry-standard security practices. | Compliance Management, PCI DSS, Security Assessments |
Project | Description | Tools Used |
---|---|---|
Cloud Security & Document Management Transformation | Transformed cloud-based document management systems for legal and academic sectors. Improved data security and collaboration using cloud technologies. | Cloud Security, Document Management Systems, Cloud Platforms |
Intellectual Property Management System Automation | Implemented an IP management system that integrated cloud-based technologies for improved security and automated workflows, serving law firms and academic institutions. | Cloud Platforms, IP Management, Workflow Automation |
Project | Description | Tools Used |
---|---|---|
Obfuscation & Code Security | Enhanced Python code security using Base64 and Pyminifier for obfuscation. Reduced the risk of reverse engineering and safeguarded intellectual property. | Base64, Pyminifier, Python |
Category | Tools Used |
---|---|
Networking & Security | Wireshark, TCP/IP, MITRE ATT&CK |
Programming & Automation | Python, PowerShell, Hashcat, Pyminifier |
Compliance & Frameworks | PCI DSS, GDPR, NIST 27000, AWS Cloud Security,MITRE ATT&CK |
Project Management & Consulting | Agile, ITIL, Vulnerability Management (Qualys) |