Projects

Click image to learn more

Incident Response Lab Phishing Reverse Shell Simulation

Overview

Simulated a real-world phishing attack resulting in a reverse shell on a Windows 11 system and performed end-to-end incident response following NIST SP 800-61. Detected, analyzed, contained, and eradicated the threat using Wazuh SIEM, Sysmon, Suricata, and pfSense firewall controls, demonstrating practical SOC, SIEM, and network defense skills.

Click image to learn more

Cloud-Based School Network Deployment(Azure & Active Directory)

Overview

Designed and deployed a secure cloud-based school network using Microsoft Azure and Active Directory, featuring segmented subnets, centralized authentication, and role-based access control. Implemented Azure Bastion, Network Security Groups, and Group Policy to enforce least-privilege access and secure administrative management.

Click image to learn more

Real Time Threat Detection Stack

Overview

Wazuh and Suricata intergrated to create a unified threat detection and network monitoring system. Wazuh serves as the SIEM, collecting and analyzing logs, while Suricata operates as the IDS/IPS, monitoring all VLAN traffic. The setup includes custom decoders and rules for severity-based alerting, IPS mode on server networks, and automated log correlation through Dockerized services. The result is a scalable, real-time detection platform that strengthens visibility and incident response across the entire network.

Click image to learn more

Portfolio Website Project

Overview

Developed static website using HTML, CSS, and Javascript. Hosted on my own Ubuntu server running Apache web server in docker container.

Click image to learn more

Firewall/ VLAN Project

Overview

Secured my home network using pfSense as the solution, focusing on VLAN configuration, firewall rules, and access point setup. Overcame challenges with DHCP, DNS, and multi-SSID support to create a stable, segmented network. This hands-on project provided valuable insight into network security, traffic management, and real-world cybersecurity practices.

Copied to clipboard!