Burpsuite
Cybersecurity professional with hands-on experience in threat analysis, vulnerability assessments, and incident response. Strong focus on team collaboration and achieving results in dynamic environments. Skilled in network security, encryption technologies, and risk management, with reliable and adaptable approach to evolving challenges. Valuable asset for enhancing security frameworks and protecting digital assets.
Network security
Tcp/ip
Intrusion detection
Incident response
Social engineering
Reverse engineering
Vulnerability assessment
Threat analysis
Burpsuite
Nmap
Nessus
Autopsy
Recon-ng
TheHarvester
Nikto
OWASP ZAP
Bettercap
AIG - Shields Up: Cybersecurity Job Simulation
Lawn tennis
Ethical hacking
Member – NullClass Cybersecurity Cohort
1. Project Title: Advanced Reverse Shell Evasion Techniques in EDR-Enabled Environments
Role: Red Team Researcher
Tools Used: PowerShell, Metasploit, Sliver C2, Sysmon, Wireshark, Procmon
Summary:
Conducted in-depth red team simulations targeting EDR-protected endpoints using fileless reverse shells, LOLBins, and custom payloads. Successfully bypassed Windows Defender and open-source EDR tools using advanced obfuscation, encoded payload delivery, and covert C2 channels. Documented detection evasion patterns and proposed countermeasures for Blue Teams.
2. Project Title: CIS Benchmark-Based System Audit and Hardening Implementation
Role: Cybersecurity Analyst – Compliance & Audit Focus
Summary:
Conducted a comprehensive baseline security assessment by deploying and configuring the CIS-CAT Pro Assessor tool to evaluate system configurations against industry-standard CIS Benchmarks. Performed in-depth analysis to identify misconfigurations, security policy violations, and compliance deviations across Windows-based systems. Generated structured compliance reports in multiple formats (HTML, CSV) and translated findings into actionable remediation strategies.
Successfully implemented Level 1 hardening controls to improve overall system security posture, reduce attack surface, and align with best practices for endpoint security. Gained hands-on experience in system auditing, benchmark mapping (NIST, ISO 27001), and policy-based enforcement, simulating real-world enterprise security assessment workflows.