- Designed and implemented a platform leveraging Docker and Kubernetes, simulating attack scenarios against web
- Integrated scenarios based on MITRE ATT&CK framework to ensure realistic security challenges
- Identified and assessed security vulnerabilities in PHP/C/C++ applications via thorough source code review, addressing key
- Utilized BinaryNinja and Ghidra for reverse engineering tasks on x86 and ARM binaries, uncovering security weaknesses by
C
CyberspACe securiTy and forensIcs lab CACTI Lab
May 2021 - December 2023
C
Coinbase
Security Engineer Intern
May 2023 - August 2023
C
CyberspACe securiTy and forensIcs lab CACTI Lab
Cybersecurity Analyst
May 2022 - May 2023
Skills
Active DirectoryAmazon DynamoDBAmazon Elastic Compute CloudAmazon S3Amazon Web ServicesAnsibleApple Mac SystemsAssembly LanguageBash ShellBuffersBurpsuiteCactiCarrying out AssessmentsCascading Style Sheets (CSS)Code ReviewCommunication SkillsCompTIA A+Computer SecurityC++ (Programming Language)Cross-Site Scripting (XSS)Data Transport UtilityDockerDomain Name System (DNS)Event ManagementFedoraFile Transfer Protocol (FTP)Firewalls (Computer Science)Health Insurance Portability and Accountability Act ComplianceHTMLInformation TechnologyIntrusion Detection SystemsISO/IEC 27001Java (Programming Language)JavaScript (Programming Language)Kali LinuxKnowledge of Standards ComplianceKubernetesLinuxLinux DistributionMaintenanceManual TestingMetasploitMicrosoft WindowsMitre Att&ckNational Institute of Standards and TechnologyNessusNetworking SkillsNmapOffensive Security Certified ProfessionalOpenSSLOpen Web Application SecurityOperational SystemsPCI Data Security StandardsPHP (Programming Language)PresentationsPython (Programming Language)QualysRed Hat Enterprise LinuxRed Team (Cyber Security)Regulatory RequirementsResearch SkillsReverse EngineeringRisk AnalysisSafety PrinciplesSecurity ControlsSecurity PoliciesSelf MotivationShell ScriptSimulationsSnort (Software)Software SecuritySoftware System Penetration TestingSoftware Vulnerability ManagementSQL DatabasesSQL InjectionStakeholder ManagementTCP/IPThreat ManagementThreat ModelingTransmission Control Protocol (TCP)Transport LayerTransport ProtocolsVoIPVulnerabilityWeb ApplicationsWindows PowerShellWireshark