Hi
πΌπ’ ππππ ππ π½πππππ π°πππ’ πΊπππππ 
π Iβm currently working on
I am currently looking for a role in Cybersecurity. Before that I worked has cybersecurity Engineer at the University of North Texas, where I assist students in cybersecurity labs, mentor them for industry certifications and develop hands-on exercises covering network security, cryptography, DevOps security and risk assessment. Additionally, Iβm engaged in AI security research, focusing on ensuring compliance with security frameworks such as ISO 27001, NIST, and HIPAA.
π― Iβm looking to collaborate on
Iβm eager to collaborate on offensive security research, penetration testing, security automation, and cloud security projects. I enjoy working on threat modeling, SIEM optimization, and improving security frameworks for AI systems.
π€ Iβm looking for help with
Iβm interested in deepening my knowledge of advanced adversarial security techniques, red teaming strategies, and zero-trust architecture implementations. If youβre an expert in these areas, Iβd love to exchange insights and learn from your experience!
π± Iβm currently learning
Iβm currently advancing my expertise in Security Orchestration, Automation and Response (SOAR) and threat intelligence platforms. Iβm also working toward earning my Certified Information Systems Security Professional (CISSP) certification.
π¬ Ask me about
Penetration testing & vulnerability management (Metasploit, Burp Suite, Cobalt Strike, BloodHound)
Security compliance frameworks (ISO 27001, NIST 800-53, SOC2, FedRAMP, MITRE ATT&CK)
Secure software development (Threat modeling, secure coding practices, DevSecOps)
Cloud and network security (AWS/Azure security, firewall configurations, network anomaly detection)
SIEM & Incident Response (Splunk, Microsoft Sentinel, QRadar, EDR solutions)
β‘ Fun fact
I once secured second place in the CanSec24 CTF challenge, where my team worked through forensics, reverse engineering, and web exploitation scenarios. I also enjoy breaking into Capture The Flag (CTF) competitions, testing my ethical hacking skills, and learning new attack vectors in my free time!



