Cybersecurity Engineer • Application Security • Secure Backend Engineering • Android Development • Full Stack Applications
I build secure software, practical security labs, and telemetry-driven workflows that turn findings into fixes — across application security, backend systems, mobile apps, databases, cloud-connected tooling, and defensive analysis.
I’m a cybersecurity engineer focused on both testing systems responsibly and building them securely. My work sits at the intersection of application security, secure engineering, threat detection, infrastructure visibility, and full stack development.
What I enjoy most is taking a problem through the full cycle: identifying risk, validating impact, analyzing system behavior, and turning that into stronger authentication, cleaner architecture, better hardening, and more resilient applications.
- Application Security: DAST, SAST support, WAF tuning, web vulnerability validation, adversary emulation, and remediation-focused analysis
- Detection & Defensive Engineering: SIEM onboarding, log pipeline customization, alert tuning, traffic analysis, event correlation, and telemetry that supports investigation and response
- Secure Engineering: Java, Spring Boot, REST APIs, authentication and session design, Dockerized services, and database-backed applications
- Full Stack & Mobile Development: Android / Kotlin development, secure local storage, thoughtful UX, and end-to-end application design across frontend, backend, and data layers
- Automation & Operations: PowerShell, Python, Ansible, cloud-connected workflows, API integrations, and tooling that improves visibility and reduces manual security effort
Application Security: Burp Suite Pro, WebInspect, Fortify SSC, Rapid7, Nikto, SQLmap, WPScan, OpenVAS
WAF / Edge Security: BIG-IP F5, Cloudflare
SIEM / Telemetry: Microsoft Sentinel, ELK (Elasticsearch, Logstash, Kibana), Splunk, Securonix, AlertLogic
IDS / Endpoint Security: SentinelOne, Sophos, Trellix, Microsoft Defender
Security Analysis: Wireshark, Maltego, SpiderFoot, Recon-ng, theHarvester, Sn1per, Metasploit, Nmap
Cloud / IAM / Automation: AWS, Azure, Okta ASM, PowerShell, Python, Ansible
Platforms: Linux, macOS, Windows

