Cybersecurity graduate student with expertise in digital forensics, network security, and cloud infrastructure. Proficient in utilizing tools such as Wireshark, Autopsy, and Snort for threat analysis and system security. Experienced in automating deployments with Terraform and Addible, alongside hands-on skills in Docker and Azure. Knowledgeable in designing security solutions for high-availability environments, with a strong focus on risk management and compliance with data protection standards.
Offensive Security & Penetration Testing:
Red Teaming, Purple Teaming, External/Internal Network Assessments, Web Application Pretesting, Vulnerability Assessment, Control Evaluation, Adversary Simulation, MITRE ATT&CK Framework, Security Control Testing
Technical Skills & Scripting:
Python, Shell, Bash, PowerShell, Java, Apex, API Testing, REST APIs, Automation Scripts, Infrastructure as Code (IaC)
Networking & Security:
TCP/IP, Routing & Switching, Active Directory Testing, Windows Internals, OAuth 20, IAM, PAM, EDR Evasion, AV Bypass, Encryption, SIEM Analysis, Log Analysis
Tools & Platforms:
Metasploit, Nmap, Burp Suite, Wireshark, Autopsy, FTK Imager, Volatility, Hydra, Nikto, TryHackMe, Docker, VS Code, Salesforce (LWC, Aura, Visualforce)
Soft Skills:
Threat Modeling, Reporting & Documentation, Technical Presentations, Analytical Thinking, Team Collaboration, Problem Solving
M.Sc. in Cybersecurity
Dublin Business School, Dublin, Ireland
09/2024 – 09/2025
CTF VM – Jurassic Park Themed Adversarial Simulation
Designed an end-to-end Capture The Flag (CTF) lab simulating real-world exploits (port scanning, cron jobs, privilege escalation) using services such as FTP, SSH, Apache, and MySQL.
Offensive Security Research – Unraveling Digital Threats
Performed phishing, ransomware, and privilege escalation simulations; conducted forensic analysis using Autopsy, Wireshark, and Volatility; proposed structured incident response framework.
Infrastructure Automation for Offensive Security
Built Python/Shell-based tools to automate vulnerability scanning, configuration validation, and exploit testing within isolated lab environments.
Digital Forensics Investigation
Investigated simulated fraud incident using FTK Imager and Autopsy, performing keyword, metadata, and timeline analysis while preserving evidence integrity.