My Projects
Project Sentinel
Designed and deployed a cloud-native SOC-in-a-box using AWS, capturing real-world attacker sessions and generating actionable threat intelligence.
Built a real-time detection pipeline (CloudWatch → Lambda → OpenSearch) to normalize logs, enrich events, reduce noise, and store curated alerts for threat analysis.
Developed Apache Airflow security workflows for daily vulnerability management, CVE/asset correlation, risk-based prioritization, and IOC feed ingestion.
Implemented AI-assisted analysis to summarize attacker activity, extract IOCs, classify behavior, and support triage with contextual insight.
Created automation pipelines for CSV reporting, email summaries, and structured outputs consumable by SOC analysts and SIEM tools.
Integrated Cowrie and Suricata to detect brute-force attempts, malicious payloads, and exploitation traffic, producing attacker-derived intelligence.
Reduced SIEM storage costs by 50–70% via Lambda filtering and tiered S3 Glacier retention without losing forensic value.
Delivered dashboards, scripts, and orchestrated workflows demonstrating modern SOC engineering, detection logic, threat intel, and automation skills.
Adversary Simulation & Threat Detection
Built a simulated attack environment with a Windows victim endpoint and Ubuntu C2 server running Sliver for malware command-and-control.
Developed and executed a custom malware payload, achieving SYSTEM-level privilege escalation on the target. (Red Team)
Performed threat hunting by investigating suspicious processes and identifying malicious executables on the compromised host. (Blue Team)
Created YARA signatures and LimaCharlie D&R rules to detect and respond to malicious activity. (Blue Team)
Tested and validated detection logic, confirming YARA rules effectively detected, scanned, and blocked the malware. (Threat Hunting)
Vulnerability Management Lifecycle
Installed and deployed Qualys Virtual Scanner Appliance and accessed it through the Qualys Cloud Platform.
Executed the vulnerability management Lifecycle in a virtualized environment, comprising the stages of: Discovery, Prioritization, Assessment, Reporting, Remediation, and Verification.
Leveraged Qualys to manage vulnerability scanning and assessed the identified vulnerabilities.
Detected deprecated software on a Windows 10 virtual machine, remediated the vulnerabilities and verified the software was no longer vulnerable.
