Learn About Me
Graduate Cybersecurity Professional
A passionate and driven cybersecurity graduate based in Sydney, with a strong foundation in cloud security, network defense, and threat intelligence. Eager to apply academic knowledge and hands-on project experience to protect digital assets and contribute to a forward-thinking security team.
What I do
Core Cybersecurity Skills
Cloud Security Architecture
Designing and implementing secure cloud environments on AWS, using VPCs, IAM, WAF, and GuardDuty.
Vulnerability Assessment
Utilizing tools like Nmap and Nuclei to identify, assess, and report security weaknesses in networks and applications.
Threat Intelligence Analysis
Analyzing attacker TTPs, dissecting phishing kits, and extracting IOCs to provide actionable intelligence.
Security Automation
Developing Python scripts to automate security tasks, such as compliance checking and log analysis.
My Projects
Key Projects
Secure AWS Web Application
Cloud Security Architecture
Designed and deployed a multi-tier web application on AWS with a focus on security. Implemented VPC with public/private subnets, Security Groups, AWS WAF, and GuardDuty for threat detection.
Read Case StudyLive Honeypot Deployment
Threat Intelligence & Docker
Deployed a DShield honeypot using Docker to capture and analyze live attack data. Built a data pipeline with CloudWatch and Lambda to visualize threat intelligence on a live dashboard.
Read Case StudyAutomated Cloud Security Auditor
Security Automation & Python
Developed a Python script using Boto3 to automatically scan an AWS account for security misconfigurations in S3 and IAM, generating a compliance report.
Read Case StudyCredentials
Certifications & Training
AWS Cloud Practitioner
Amazon Web Services
EarnedCompTIA Security+
CompTIA
In ProgressAWS Security Specialty
Amazon Web Services
In ProgressCompTIA Network+
CompTIA
In ProgressMy Approach
Cybersecurity Focus Areas
Defensive Security (Blue Team)
Protect & Respond
Focused on protecting systems through robust architecture, continuous monitoring, and rapid incident response.
Offensive Security (Red Team)
Identify & Exploit
Adopting an adversarial mindset to discover and validate vulnerabilities before malicious actors can.
Cloud Native Security
Secure by Design
Specializing in securing cloud infrastructure (AWS) by embedding security into every stage of the lifecycle.
Governance & Compliance
Align & Assure
Understanding security frameworks (e.g., ISO 27001, NIST) to ensure organizational alignment and risk management.
Automation Showcase
AI & Orchestration Projects
AI-Powered Cybersecurity Blog
An automated content pipeline using a locally-hosted LLM (Ollama) and n8n to generate, format, and publish relevant cybersecurity articles. This demonstrates advanced skills in AI implementation and workflow automation.
Coming SoonReal-Time Threat Alerting
A live security monitoring workflow built with n8n. It processes attack data from a Docker-based honeypot and sends real-time, formatted alerts to a Discord channel, simulating a modern SOC's automated response capabilities.
View on GitHubGet In Touch