[Skills]
- Programming: Python, JS, Bash, PowerShell
- Databases: SQL, SQLite, MySQL
- Proficient with MacOS, Linux, Windows
- Version Control: Git and GitHub
- Agile Methodologies: Kanban & Lean Development
- Security disciplines: OSI Model, Network scanning
- Web Application Security based on OWASP Top 10: XSS, SQLi, SSRF, Broken Access Control, Clickjacking
- Windows/Linux Privilege Escalation Techniques
- Impersonation Attacks, DLL Hijacking
- Windows Subsystem for Linux
- Networking – OSI model, VPNs, Firewalls, IDS/IPS
- OWASP Top 10 – Web Application Security
- MITRE ATT&CK Framework and Matrix
A Cyber Security student in the final year passionate about Web Application Security, and Bug Bounty Hunting. My studies have given me a strong foundation in programming, operating systems, network protocols, and security technologies, skills I enjoy applying to solve practical, real-world challenges.
I am actively involved in the cybersecurity community, participating in Capture the Flag (CTF) events and exploring new ways to detect and mitigate security threats. I stay up-to-date with the latest attack techniques, defensive tools, and security frameworks, ensuring I continuously grow as both a learner and practitioner.
I enjoy experimenting with tools, testing system defenses, and identifying vulnerabilities to understand how defenders can stay ahead. I am currently seeking opportunities to contribute to a security-focused team.
[Tools and Frameworks]
[Infrastructure & Containerization]
Docker, Kubernetes, Podman, VMware, VirtualBox, Open vSwitch, Mininet
[Emerging Technologies]
Large Language Models such as Ollama, DeepSeek-R1, OpenAI, NotebookLM, Grok, Perplexity, NotebookLM, LM Studio, Google Gemini, custom GPTs, local LLM deployment, and fine tuning
[Frameworks & Standars]
COBIT, ITIL, ISO 27001, NIST 800-115 ISO 27001, NIST 800-30, CIS Controls, OWASP Top 10, Cyber Kill Chain
