About me
I'm a cybersecurity professional with a passion for both offensive and defensive operations. With certifications in RHCSA, CEH, CRTA, CPTS, CDSA, and Security+, I specialize in Active Directory attacks, Kerberos trust abuse, and scripting attack chainsβwhile also triaging SIEM alerts, responding to incidents, and securing hybrid environments. While Iβve built a strong foundation in SOC operations and adversary simulation, Iβm currently expanding my expertise into cloud security, focusing on IAM hardening, misconfiguration detection, and cloud-native threat defense. My long-term goal is to transition into a Cloud Security Engineer role, where I can design scalable security architectures and drive proactive protection across cloud platforms.
What i'm doing
-
Security Operations & Incident Response
π‘οΈ Actively engaged in blue team workflows including SIEM alert triage, log analysis, and threat containment. Building expertise in detecting and responding to adversarial activity across hybrid environments.
-
Threat Detection Engineering
π§ Developing and tuning detection rules using Sigma, Sysmon, and MITRE ATT&CK mapping. Focused on improving visibility and reducing false positives through data-driven analysis.
-
Cloud Security Development
βοΈ Currently learning AWS and Azure security fundamentals, including IAM hardening, audit logging, and misconfiguration detection. Preparing for future transition into a Cloud Security Engineer role.
-
Technical Reporting & Documentation
π Creating structured incident reports, CVSS scoring, and SysReptor-formatted documentation. Emphasizing clarity, reproducibility, and alignment with industry standards.
-
CTF Participation & Adversary Simulation
π― Actively solving challenges on Hack The Box and TryHackMe to sharpen skills in enumeration, privilege escalation, and lateral movement. Using CTFs to simulate real-world attack scenarios and improve defensive strategies.