Cybersecurity Graduate
Experienced in SOC, Security Consulting, Penetration Testing and Criticial Infrastructure Defence
I’m a passionate cybersecurity graduate with a focus on security consulting, engineering, and penetration testing. My work blends technical depth—secure scripting and host monitoring with governance and compliance insight.
I’m especially interested in protecting critical national infrastructure, where strategic thinking and robust controls intersect. Whether assessing risk, drafting policy, or delivering security improvements, I aim to bridge business needs with effective, resilient cybersecurity solutions.
Identifying and exploiting vulnerabilities in systems, networks, and applications to improve security posture.
Designing and implementing secure network architectures and monitoring for malicious activities.
Automating tasks with secure practices and implementing monitoring to detect misuse, reduce vulnerabilities, and protect sensitive operations.
Responding to security breaches, investigating incidents, and implementing recovery plans.
Conducting comprehensive security assessments and compliance audits.
Monitoring industrial systems, anlysing threats, and implementing secure control strategies for ICS/OT networks.
Performed a black-box penetration test on a vulnerable Linux-based host. Identified critical flaws, mapped findings to MITRE ATT&CK, and delivered a consultant grade report with executive summary and remediation plan.
Developed a lightweight Bash script to detect file changes and suspicious process activity on Linux systems, designed for endpoint monitoring in low-infrastructure environments.
Conducted a comprehensive case study of the Nobelium attack on SolarWinds, modelling the full cyber kill chain, producing risk matrices, drafting policies, and proposing a post-breach defensive architecture with controls mapped according to NIST and ISO 27001 principles.
Interested in working together or have a question?
Feel free to get in touch — I’m always open to discussing opportunities in cybersecurity consulting, penetration testing, or critical infrastructure defence.