πΉ Application Security Β | Β πΉ Secure Full-Stack Development Β | Β πΉ Linux Hardening & Automation
Final-year Computer Science student focused on building secure, scalable, production-ready systems.
I design, build, and secure modern web applications by combining full-stack engineering with application security, Linux hardening, and automation. I reduce real-world security risk by identifying authorization flaws, hardening systems, and validating security controls in production-like environments.
My approach integrates professional engineering standards with proactive cybersecurity measures. I focus on reducing risks during the development lifecycle β ensuring security is a core feature of the system architecture, not an afterthought.
- Secure Web App Development: Auth, RBAC, API Security, Input Sanitization.
- Application Security Testing: IDOR, XSS, SSRF mitigation, and Access Control validation.
- Linux Hardening: Enterprise configuration, OS security, and Shell automation.
- Python for Security: Custom threat detection and security operation tooling.
Category: Application Security Β· Threat Detection
- Problem: Phishing attacks via malicious URLs bypassing standard filters, exposing users to credential theft.
- Solution: Designed and built a secure full-stack platform that analyzes URLs using heuristic checks, pattern analysis, and external threat intelligence APIs.
- Security Focus: URL threat scoring, input sanitization, secure API integration, and real-time alerting.
- Impact: Reduced phishing exposure by automating analysis and enabling near real-time detection instead of manual review.
- Stack: React, Node.js, Python, Security Intelligence APIs, OWASP best practices.
Category: Network Security Β· Blue Team
- Problem: Ineffective detection of anomalous traffic patterns in traditional rule-based monitoring, delaying incident response.
- Solution: Developed a Python-based IDS to monitor live network traffic and flag suspicious behavior using traffic pattern analysis.
- Security Focus: Network anomaly detection, packet inspection, and automated alert workflows.
- Impact: Improved time-to-detect suspicious traffic and enabled faster incident mitigation.
- Stack: Python, Linux, Network Security Tools, Packet Analysis.
Category: Cryptography Β· Secure Systems
- Problem: Sensitive files transferred over insecure channels vulnerable to interception and unauthorized access.
- Solution: Implemented a secure file transfer system using AES-256 encryption and integrity validation.
- Security Focus: End-to-end encryption, SHA-256 integrity checks, and secure authentication.
- Impact: Prevented unauthorized access and ensured data confidentiality during critical transfers.
- Stack: Python, AES-256, Cryptography Libraries, Linux.
Category: Secure Engineering Β· Logistics
- Problem: Logistics platforms often lack proper RBAC and secure real-time synchronization, risking operational data.
- Solution: Built a production-ready logistics platform with secure authentication and granular Role-Based Access Control.
- Security Focus: Secure Auth flows, RBAC enforcement at API level, and secure real-time synchronization.
- Impact: Prevented unauthorized access to sensitive operational data and ensured secure user isolation.
- Stack: React, Firebase, Node.js, Secure API Design.
- β CompTIA Cybersecurity Professional Track (Network+, Security+, CySA+, PenTest+)
- β Red Hat Linux System Administration (Industry Internship Alumnus)
- β AWS Certified Developer β Associate
"I focus on reducing real-world security risk, not just finding vulnerabilities."
I aim to grow as a secure software engineer who understands both system design and system defense.
