Responsible for the coding and implementation of a network protocol scanner and a popular feature enabling threat hunters to convert UI queries to cURL requests.
Worked to protect a network of 11 universities from potential threats and vulnerabilities
Performed research with the purpose of finding vulnerabilities within Blockchain technologies.