Nessus


Results-driven Cyber Security Engineer with hands-on expertise in application security reviews, penetration testing, and vulnerability assessment. Demonstrated proficiency in identifying and mitigating security risks throughout the software development lifecycle using threat modeling, SAST/DAST tools, and secure coding practices. Certified in offensive security methodologies (CEH v13, OHSE) with practical experience in DNS/DHCP protocol security, OWASP Web/API Top 10 mitigation, and security-focused Python automation. Proven ability to collaborate with development teams to embed security into agile workflows and enforce compliance frameworks including ISO 27001, NIST, and PCI DSS.
Years of post-secondary degree
Certified ethical hacker
Ethical hacking
Active participant in cybersecurity forums like Hack the Box, TryHackMe , CyberDefenders , LetsDefend .
Nessus
OpenVAS
Extrahop
Trend Micro XDR
Splunk
Burp Suite
Nmap
Wireshark
Metasploit
Splunk
Ghidra
IDA PRO
FRIDA
Brute-force Attack Detection & Log Analysis (SOC Simulation)
Tools: Splunk Enterprise, Universal Forwarder, Sysmon, Windows Event Logs, PowerShell
Skills: SIEM Configuration, Log Analysis, Incident Detection, MITRE ATT&CK (T1110)
Continuous Facial Authentication Using Fuzzy System
• The emergence of continuous facial authentication using fuzzy logic points to success in protecting user data in the driver environment.
• This new approach transforms user authentication by integrating facial recognition into log-in, log-in and log-out processes.
• When users create an account, their facial profile is carefully recorded and associated with DriveSpace, providing ongoing verification throughout
• The system not only identifies the user, but is also vigilant, immediately cutting off the connection when it detects illegal or inappropriate behavior
Advanced Web Application Penetration Test
passionate photographer and editor