Defending the Digital Frontier

Cyber Analyst | Threat Detection | Risk Mitigation

Contact Me
Make Your Credentials Safe

Core Skills

πŸ” Network Security
πŸ“‘ Threat Intelligence
πŸ›‘οΈ Vulnerability Assessment
⚑ Incident Response
πŸ’» Ethical Hacking
☁️ Cloud Security

Case Studies

Incident Response for Banking Sector
Detailed analysis of threats and mitigation strategies to protect banking infrastructure.
Phishing Simulation & Training
Conducted phishing simulations to train staff, achieving measurable improvements in awareness.
Cloud Security Hardening
Improved cloud infrastructure security through IAM policies, encryption, and network segmentation.

Timeline View

Incident Response for Banking Sector
Threats detected and mitigated quickly, avoiding downtime.
Phishing Simulation & Training
Staff awareness improved by 45% after training exercises.
Cloud Security Hardening
Implemented encryption, IAM controls, and secure VPC setup.

Tools & Technologies

Kali Linux
Kali Linux
Penetration testing OS with multiple security tools.
Wireshark
Wireshark
Network protocol analyzer for traffic inspection.
Splunk
Splunk
Data analytics & security monitoring platform.
Metasploit
Metasploit
Exploit framework for security testing & pentesting.
Burp Suite
Burp Suite
Web vulnerability scanner & security testing tool.

Cyber Security Highlights

πŸ” 150+

Critical Vulnerabilities Identified

πŸ’» 200+

Systems Secured

⚑ 50+

Incident Responses Completed

☁️ 30+

Cloud Security Projects