Building Security Expertise

Learning offensive and defensive security operations through hands-on coursework and practical projects.

About Me

I'm actively developing my skills in cybersecurity, with a focus on both offensive and defensive security techniques. Through structured coursework and hands-on labs, I'm building practical experience in identifying vulnerabilities and implementing security controls.

My learning path covers penetration testing, threat detection, incident response, and security architecture. This portfolio showcases the projects and labs I've completed as I work toward a career in cybersecurity.

I'm particularly interested in understanding both sides of security—how attackers think and how defenders protect systems—which is why I'm pursuing knowledge in both red and blue team operations.

RT
Red Team Operations

Learning penetration testing & exploitation

BT
Blue Team Defense

Studying threat detection & response

SC
Secure Development

Python, Bash, security scripting

SA
Security Fundamentals

Risk assessment, threat analysis

Projects

Course projects and labs demonstrating hands-on security skills

Red Team

Web Application Security Lab

Course project focused on identifying and exploiting common web vulnerabilities in a controlled lab environment.

SQL Injection XSS CSRF
Blue Team

Security Monitoring Project

Built detection rules and analyzed log data to identify security events and potential threats in a simulated environment.

Splunk Log Analysis Threat Hunting
Red Team

Network Security Tools

Python scripts developed for network reconnaissance and vulnerability scanning as part of coursework exercises.

Python Networking Automation

Blog

Learning notes and writeups from my cybersecurity journey

Jan 15, 2025 • 5 min read

Setting Up My First SIEM

A beginner's guide to deploying Splunk, configuring log sources, and creating basic detection rules for common security events.

Read more →
Jan 10, 2025 • 8 min read

Learning Penetration Testing

My approach to learning pentesting fundamentals, including reconnaissance techniques, exploitation basics, and documenting findings.

Read more →
Jan 5, 2025 • 6 min read

Getting Started with Threat Hunting

Introduction to proactive threat detection using open source tools and basic scripting to search for suspicious activity in logs.

Read more →

Let's Connect

Interested in connecting or discussing cybersecurity?