Initializing cybersec portfolio...
Cybersecurity & AI Pro
$ whoami
Cybersecurity & AI professional — securing systems, one threat at a time.
Get to know me better
Results-driven Cybersecurity & AI professional with hands-on experience in penetration testing, threat analysis, network security, and secure system design. IBM Certified in Cybersecurity with a Master's in Information Studies. Proven track record maintaining PCI DSS compliance, implementing SSL/WAF security controls, and conducting vulnerability assessments. Passionate about applying skills in incident response, SIEM monitoring, and threat intelligence to protect organizations from evolving cyber threats.
Contact MeExperience
Companies Served
Publications
Certifications
Technical proficiency
My professional journey
Monitor and analyze cybersecurity events to detect threats, anomalies, and potential incidents in real time. Support implementation of security protocols and controls, conduct vulnerability assessments, and collaborate with IT teams to remediate security gaps. Maintain accurate security documentation and incident reports.
Maintained 100% PCI DSS compliance across all digital payment channels with zero security breaches. Monitored and secured transaction systems, resolved 95% of issues independently, conducted daily transaction audits and anomaly detection with 100% accuracy, and ensured 99.9% uptime through proactive maintenance.
Reduced system downtime by 15% through proactive monitoring and root cause analysis. Documented system errors for weekly management review, driving a 20% efficiency improvement.
Managed sensitive client data and payment systems with 100% service continuity. Boosted policy sales by 25% and improved client retention by 15%.
Led a team of 5 engineers, delivered projects 5% ahead of schedule with a 10% efficiency gain.
Built secure, responsive web applications; drove 30% traffic growth and 20% client satisfaction improvement.
Academic background
Research & academic contributions
Security & engineering work
Implemented SSL, secure payment gateways, and WAF on live e-commerce site (TookTaakShop.com).
Threat detection, pentesting, vulnerability assessment, and mitigation across various environments.
Secure IoT architecture with robust access controls and end-to-end encryption.
RFID + IoT system with secured data transmission and real-time billing.
Real-time sensor-based decision systems for autonomous navigation and obstacle avoidance.
Microcontroller-based synchronized motion control for bipedal locomotion.
Professional credentials
Network Security, Penetration Testing, Cryptography — IBM Certified (2025).
Certified ethical hacker with hands-on penetration testing and exploitation skills.
Certified in web development with a focus on secure, responsive applications.
Capstone Design Competition Winner — outstanding engineering achievement.
What I offer
Simulated cyberattacks to identify and exploit vulnerabilities, helping assess your security posture and protect data and assets from malicious actors.
Monitoring, analyzing, and responding to security incidents in real time — a proactive approach to identify threats, mitigate risks, and enhance overall security posture.
Deep-dive threat analysis including IDS/IPS, firewall configuration, and SIEM monitoring to detect anomalies and prevent breaches before they occur.
Systematic identification and evaluation of security weaknesses across systems and networks, with documented findings and actionable remediation steps.
Securing routers, switches, firewalls, and wireless infrastructure — including SSL/TLS, WAF, and PCI DSS compliance to protect data in transit.
Rapid identification, containment, and recovery from security incidents — minimizing impact and preventing recurrence through thorough post-incident analysis.
Gathering and analyzing publicly available information to detect security threats, enhance threat detection, and support risk mitigation efforts.
Securing IoT architectures with robust access controls, encryption, and automated threat detection to protect connected devices and data.
Applying Python-based machine learning for automated threat detection, predictive analytics, and adversarial defense across cybersecurity domains.
Professional credentials & achievements
Network Security, Penetration Testing & Cryptography — IBM Certified (2025)
Certified ethical hacker with penetration testing & exploitation skills
Certified in building secure, responsive web applications
Capstone Design Competition Winner — outstanding engineering achievement
Let's work together