π I hold a Bachelor's degree in Computer Engineering and a Masterβs in Cybersecurity, strongly focusing on digital defense, ethical hacking, and threat detection. Over the past year, Iβve been deeply committed to advancing my technical skills through hands-on labs, independent study, and active participation in cybersecurity platforms.
π My goal is to contribute to building secure digital systems by applying a blend of engineering principles, security methodologies, and a passion for continuous learning.
- π§ͺ Building a custom cybersecurity lab to simulate attack and defense scenarios using Kali Linux, Metasploit, Security Onion, and Splunk.
- π Practicing threat analysis and detection using MITRE ATT&CK techniques and platforms like TryHackMe & Hack The Box.
- ποΈ Documenting workflows and lab results to develop a personal InfoSec knowledge base and showcase practical experience.
- π‘οΈ Threat Detection & SIEM Tools (e.g., Wazuh, Splunk, OSSIM)
- π Web Application Security Testing (OWASP Top 10, Burp Suite, OWASP ZAP)
- π§ Digital Forensics (Autopsy, Volatility, FTK Imager)
- π Python for Security Automation (log parsing, alert scripts, reporting)
- π Preparing for CompTIA Security+, with plans for CEH and GCFA
- π§© Open-source cybersecurity tools or beginner-friendly security projects
- π― Capture The Flag (CTF) teams and security challenge events
- π° Educational content or guides on cybersecurity fundamentals
- π Malware analysis labs or small-scale forensic case simulations
- π§βπ» Entry-level cybersecurity roles, such as:
- SOC Analyst
- Junior Penetration Tester
- Cybersecurity Analyst
- Digital Forensics Assistant
- SOC Analyst
- π§ Mentorship and career guidance from InfoSec professionals
- π οΈ Real-world exposure to incident response, vulnerability management, and network monitoring environments
- π§° Setting up a personal cybersecurity lab using free tools and virtual machines
- π§Ύ Basic digital forensic workflows β from disk imaging to artifact recovery
- π Transitioning into cybersecurity from a general tech/engineering background
- π Learning resources and study paths I found helpful in my journey
I love analyzing real-world cyberattack case studies and recreating them in lab environments to understand how they unfolded β and how they couldβve been stopped. Itβs both a challenge and a form of training.

