Build perfectly.
Break securely.
I focus on practical security—breaking systems to understand them, then designing defenses that actually work.
Web Security • Blue Teaming • OSINT • Applied Research
Core Skills
What I actually do well.
Cybersecurity & Blue Teaming
• Web app security (OWASP Top 10, exploitation)
• IDS/SIEM setup & tuning (Suricata, Wazuh)
• Log analysis & incident investigation
• Home lab attack–defense simulations
Offensive Foundations
• CTF problem-solving (Web, OSINT, Crypto)
• Custom tooling for exploitation
• Attack vector analysis
OSINT & Digital Forensics
• OSINT-driven investigations
• Blockchain transaction analysis
• Evidence collection workflows
Applied AI in Security
• NLP-driven alert summarisation
• Agent-based security workflows
• LLMs for investigation support
Projects
Concrete work. No fluff.
UniTie
Real-world event management platform designed with security-first thinking (Auth, RBAC, Abuse prevention).
Blockchain Forensics
Platform for transaction graph analysis and OSINT-assisted deanonymisation of wallet clusters.
Agentic Wazuh SOC
AI-assisted SOC using Wazuh and NLP to automate alert triage and reduce analyst fatigue.
Suricata IDS
Deployed and tuned Suricata for network threat detection with custom rulesets.
Endpoint Monitor
Real-time file integrity monitoring system to detect persistence techniques.
Security Tooling
Educational keyloggers, enumeration scripts, and custom exploit tools.
Experimental Lab: CVE-2024-34351
I host intentionally vulnerable apps to demonstrate exploitation vectors. This instance contains a live RCE vulnerability (Prototype Pollution).
Enter Security LabNot a specialist in one thing. Not a beginner in many.
I build breadth to find depth—and I document the journey.