

Cybersecurity professional specializing in threat detection, log analysis, and security monitoring, currently completing an MSc in Cybersecurity at Dublin Business School. Experienced working with SIEM and security tooling such as Wazuh, Suricata, Graylog, Kali Linux, and Metasploit to detect anomalies, investigate security events, and support security operations workflows.
I apply a structured, process-driven approach to alert triage, initial investigation, and escalation, ensuring that potential incidents are analyzed with the right context and documented clearly for Level 2 review. Through hands-on SOC labs, job simulations, and security projects, I've gained practical exposure to monitoring dashboards, reviewing alerts, correlating data sources, and following runbook-style procedures for handling events.
Comfortable creating concise, actionable documentation-from incident summaries to procedural notes-and collaborating with cross-functional peers, mentors, and technical teams to validate findings, fine-tune detection logic, and strengthen operational security outcomes.
I am committed to contributing effectively in an entry-level SOC environment by supporting continuous monitoring, delivering structured reports, and helping improve the organization's security posture through disciplined execution and a strong analytical mindset.
• Applied security updates and configuration changes to strengthen website defenses and reduce exposure to vulnerabilities.
• Monitored website logs and activity patterns to detect suspicious behavior, blocking threats proactively to help maintain 99% uptime.
• Documented significant security events and changes, providing clear summaries for leadership when anomalous activity was detected.
• Coordinated with team members to ensure secure content updates, reinforcing compliance with internal guidelines.
• Analyzed user queries and provided support to troubleshoot issues and boost customer satisfaction.
• Monitored simulated SIEM dashboards (Wazuh, Graylog) to detect anomalous activity, review logs, and identify high-risk events across endpoints, servers, and network traffic.
• Conducted initial triage of security alerts, gathering contextual data and applying runbook-style logic to determine severity and next actions.
• Prepared incident documentation and escalation packages with clear evidence and recommendations for Level 2 review.
• Followed structured SOC procedures and investigative workflows, contributing to improvements in alert categorization and detection refinement.
• Delivered small-scale weekly reporting summaries, including notable incidents, false positives,
d security observations derived from lab environments.
Network Vulnerability Assessment (Vision Three Lab)
Built a simulated enterprise lab with Wazuh, Suricata, and Graylog to detect and respond to attacks.
Successfully correlated SQL injection and brute-force attempts, improving detection and response.
Web Security & Secure Development (DVWA Lab)
Tested SQL injection and XSS across DVWA security levels and analyzed code differences.
Applied secure coding practices to patch vulnerabilities and strengthen web app security.
Honeypot Deployment & Threat Analysis
Deployed a honeypot using Wazuh and Suricata to study attacker behaviors in a safe environment.
Captured and analyzed real attack attempts, improving threat research and defense strategies.
Digital Forensics Investigation
Used FTK Imager and Wireshark to investigate simulated malware traffic and system compromise.
Reconstructed attack timelines and validated evidence for reporting and legal readiness.
Static Code Analysis (Secure Development Review)
Audited Flask applications with Semgrep and CodeQL, focusing on OWASP Top 10 issues.
Produced a comparative report highlighting strengths and limitations of each tool.
Policy, Compliance & Risk Assessment
Researched ISO 27001, GDPR, and NIST to design a risk-based cybersecurity framework.
Delivered policy recommendations and training models to improve resilience in SMEs and smart grids.



Mastercard Cybersecurity virtual experience program on Forage - August 2025:
Completed a job simulation where I served as an analyst on MasterCard’s Security Awareness Team. I helped identify and report security threats such as phishing. I also analyzed and identified which areas of the business needed more robust security training and implemented training courses and procedures for those teams.
Verizon Cloud Platform Job Simulation on Forage - September 2025
Deloitte Australia Cyber Job Simulation on Forage - September 2025
Microsoft Student SOC Program Foundations Training - September 2025