Results-driven cybersecurity and AI-focused security professional with a robust foundation in threat detection, network defense, and risk management. Skilled in implementing defensive strategies and securing enterprise infrastructure across hybrid environments. Experienced with modern tools, including IDS/IPS, firewalls, endpoint protection platforms, and AI-driven threat intelligence systems. Adept at leading training programs, developing incident response protocols, and nurturing cybersecurity talent. Dynamic cybersecurity instructor with a strong focus on cyber threat analysis, vulnerability assessments, and risk management. Committed to delivering expert training and guiding students towards certification success.
Delivered expert-level training on cybersecurity concepts, red and blue team operations, and security tool deployment.
Designed and facilitated hands-on labs covering vulnerability assessments, segmentation, and malware reverse engineering.
Advised students on certification paths, including Security+, CEH, and CISSP, ensuring high success and readiness for the field.
Cyber threat analysis and mitigation
Vulnerability assessment and penetration testing
Security Awareness Training
SIEM and endpoint protection
Firewalls, IDS/IPS (Snort), and pfSense
Risk assessment and incident response
Operating system security (Windows, Linux)
Data encryption and cryptography
Artificial intelligence in cybersecurity
Excellent communication and team leadership
CompTIA Security+
CompTIA Network+
Google IT Support Professional Certificate
Certified Ethical Hacker (CEH)
Certified Information Systems Security Professional (CISSP) – In Progress
Project Experience
Blue Team Defense: Securing Legacy Infrastructure
Tools: Nmap, pfSense, Snort IDS, Syslog-ng, WSUS, VLANs, Windows Server, Ubuntu
Conducted vulnerability assessments and hardened perimeter defenses.
Automated patching processes and implemented network segmentation using VLANs.
Authored incident response reports and updated standard operating procedures (SOPs).
Red Team Engagement: Exploiting Vulnerable Windows Systems
Tools: Nmap, Metasploit, Telnet, Netcat
Identified and exploited SMB vulnerabilities using EternalBlue.
Documented attack vectors and provided comprehensive remediation strategies.
Malware Analysis: Android Threat Identification
Tools: YARA, MobSF, Cuckoo Sandbox, ADB
Developed custom YARA detection rules and analyzed APK behavior in a sandboxed environment.
Documented indicators of compromise (IoCs) and mitigation recommendations.