Skip to content

highfunctioning/github.io

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 

Repository files navigation

🔐 My Cybersecurity Portfolio Welcome to my cybersecurity portfolio a showcase of my projects and experiences from earning the EC-Council Certified Ethical Hacker (CEH) certification and completing a Master's in Information Systems Security.

🎯 Core Competencies Security Programming & Automation (Python, Bash, SQL)

Incident Detection & Response (Suricata, Chronicle, Splunk)

Cloud & Network Security (OpenStack, Snort, TCP/IP)

Vulnerability Assessment & Cryptography (RSA, Threat Modeling)

Operating System & Kernel Security (Linux, Syzkaller)

Blockchain & IoT Security

Security Frameworks: NIST RMF, CIS Controls, ISO 27001, CIA Triad

Additionally, it has paved the way for me to pursue one of the entry-level following roles:

  • Cybersecurity Analyst = Security Analyst
  • SOC Analyst
  • Information Security Analyst
  • IT Security Analyst
  • Cyber Defense Analyst

Skills

Skills/Knowledge Gained 1 Security Audit INFOSEC, NIST RMF, CISSP, CIA Triad, Incident Response Playbooks 2 Network Security TCP/IP, Network Architecture, Firewalls, VPNs, Azure Network Security Groups (NSGs), Azure Firewall 3 Cloud Security Microsoft Azure, OpenStack, IAM, Azure Defender, DDoS Protection, Azure Security Center 4 SIEM & SOC Operations Microsoft Sentinel, Chronicle, Splunk, Suricata, KQL, Security Alert Triage, Log Correlation 5 Threat Detection & Response Incident Lifecycle, Threat Hunting, Detection Rules, SOAR (Logic Apps), MITRE ATT&CK 6 Linux & SQL Bash, Shell Scripting, Linux OS, SQL Queries 7 Cryptography & Risk Assessment RSA, Digital Signature, Threat Modeling, Risk Analysis 8 Packet Analysis Wireshark, tcpdump, PCAP, Network Forensics 9 Scripting & Automation Python, Bash, Automation Scripts, Regex, PEP 8 10 Reverse Engineering Ghidra, Jython, DLL Injection, Binary Analysis 11 IoT & Endpoint Security MAC-based Identification, API Integration, Device Profiling 12 Cloud SOC Projects Monitoring Azure AD, VMs, and Sentinel Logs; Automating Playbooks using Logic Apps

Tools

Several tools that I used:

#Cloud & Infrastructure: Microsoft Azure, OpenStack, Azure Security Center, Azure AD, Azure Firewall, NSG, VPN Gateway

#SIEM & SOC Operations: Microsoft Sentinel, Chronicle, Splunk, Microsoft Defender XDR, Logic Apps

#Intrusion Detection / Prevention & Packet Analysis: Suricata, Snort, Wireshark, Tcpdump, PCAP

#Programming & Scripting: Python, Bash, KQL (Kusto Query Language), SQL, Regex, PEP 8

#Burp Suite – Web vulnerability scanning and exploitation

#Metasploit Framework – Exploit development and post-exploitation

#Nmap – Port scanning and network discovery

#Hydra – Credential brute-forcing

#Aircrack-ng – Wireless network testing

#SQLMap – SQL injection automation

#Dirb / Gobuster – Web directory brute-forcing

#Nikto – Web server vulnerability scanner

My Projects

Created public key infrastruction based on RSA

Implemented RSA Encryption/Decryption amd Digital Signature using python. 2024 • Implemented RSA encryption/decryption for secure communication using 16-bit random prime numbers. Integrated digital signatures with private keys to authenticate entitie

Ghindra Reverse engineering tool plugin

  • Description: Developed a Jython script plugin for Ghidra targeting known DLL injection techniques. Demonstrated DLL injection in game, showcasing the vulnerabilities. Integrated script into Ghidra to automatically identify instances of these functions in binaries, alerting users to possible DLL injection attacks.
  • Technologies Used: Reverse engineering tool Gidra,Python, Java, Wesnoth Game, DLL. more

Cloud Platform and Network Security

• Installed OpenStack to deploy a multi-node virtual network and security assessments. • Deployed a cloud environment secured with Snort, an Intrusion Detection and Prevention System (IDPS), to mitigate TCP SYN flood attacks. Integrated custom Snort rules and security groups against real-world cyber threats.

IoT Device Scanner and Packet Capture Tool

• Developed IoT device scanner using Python, enabled to discover, analyze active devices on local Wi-Fi networks. • Stored captured data in pcap format and organized it in a SQLite database for analysis. • Integrated API calls for real-time vendor identification based on MAC addresses, enhancing user experience by providing detailed device information alongside packet analysis capabilities.

Kernel Fuzzer Security Evaluation 2024

• Analyzed automated deduplication tools such as Syzkaller, Syzbot uncovering limitations to enhance bug detection, aiming to optimize efficiency in Kernel Fuzzer.

Experience

  • Challenge designer AtHackCTF, Concordia University's first national Capture The Flag competition brought to you by TECHNATION and Hexploit-Alliance. more

Cyber Security Intern Police Cyber Security Summer Internship Gurugram, India • Reviewed 20+ live cybercrime case studies, social engineering attacks, phishing, ransomware, and data breaches. • Collaborated with law enforcement officers to analyze, interpret digital evidence, improving outcomes by 15 percent. • Assisted in developing enhanced cybercrime response protocols based on case study findings.

Stay tuned for updates!

This portfolio will continuously grow as I complete more certificates and projects. I encourage you to visit again to see my progress and learn more about my skills and experience. Thank you for your time. For more information, please connect with me on Linkedin.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published