Cybersecurity & Cloud
Solutions

Penn State student specializing in Security Operations and Cloud Security, focused on building secure, resilient systems and defending organizations’ environments against modern threats.

Website is powered on AWS via Infrastructure-as-Code!

[NETWORK STATUS]

Portfolio Visitors

0

✓ System Online

About Me

Personal background and professional philosophy

I'm a Penn State student passionate about securing organizations’ infrastructure and defending against sophisticated cyber threats. My journey into tech began with a low-end laptop I pushed to its limits just to play games, a simple challenge that sparked a fascination with how systems work. That curiosity evolved into becoming a Computer Technician in high school, where I developed practical experience in troubleshooting, system optimization, and helping people feel confident in their technology.

This foundation led to my deep dive into cybersecurity and cloud computing. Today, what motivates me is building secure, reliable, and resilient systems, and ensuring organizations can operate safely in an environment where threats are constantly evolving.

🎯 My Mission

To defend modern environments by designing secure architectures, reducing attack surfaces, and implementing proactive security measures that help organizations stay ahead of emerging threats.

💡 What I Do

I improve security posture across cloud and on-prem environments by implementing secure-by-design architectures, conducting threat-driven assessments, automating defensive controls, and deploying reliable infrastructure that supports enterprise-scale operations.

Beyond building systems, I’m committed to continuous security learning, staying ahead of threat trends, studying attacker behavior, strengthening defense strategies, and adopting modern practices. I also seek to explore how to integrate security deeper into workflows to create environments that are both agile and resilient.

Core Competencies

Specialized expertise areas

🛡️

Security Operations

Threat hunting, incident response, vulnerability management, Threat Modeling, Threat intelligence

95% Expertise

🏛️

Governance, Risk, and Compliance

Security policies, mapping controls to frameworks, risk assessments, and ensuring compliance requirements

90% Expertise

☁️

Cloud Security

Designing and managing secure, scalable infrastructure across AWS and Azure

85% Expertise

👤

Identity and Access Management

Least-privilege access, authentication/authorization, IAM policies and roles, and designing identity governance

80% Expertise

Skills

Technical proficiencies and tools

Security Operations

  • ▸ SIEM (Splunk, Microsoft Sentinel)
  • ▸ SOAR (Shuffle)
  • ▸ EDR (Microsoft Defender, LimaCharlie)
  • ▸ Vulnerability Management (Tenable Nessus)

Cloud & Infrastructure

  • ▸ AWS
  • ▸ Azure
  • ▸ Infrastructure-as-Code (Terraform, CloudFormation)
  • ▸ Identitiy & Access Management

Governance, Risk, & Compliance

  • ▸ GRC Practices
  • ▸ NIST CSF
  • ▸ CIS Controls
  • ▸ NIST RMF (800-53)
  • ▸ SOC 2
  • ▸ ISO 27000 Series

Languages

  • ▸ Python
  • ▸ PowerShell
  • ▸ Bash
  • ▸ Java
  • ▸ JavaScript
  • ▸ SQL

Projects

Filter by category to explore (More projects coming soon!)

🛡️ proj_001
Automated Threat Detection & Response
Enterprise-grade automated detection & response pipeline.
SIEM SOAR Slack Active Directory
☁️🛡️ proj_002
Cloud Security Compliance Automation
Automated enforcement of security controls via self-healing pipeline.
Azure Terraform Python Azure Runbooks
🕵️‍♀️🐛 proj_003
Malware Static Analysis and Detection Tool
Python-based malware analyzer that correlate data for risk assessment with EDR integration.
Python EDR VirusTotal

Contact Me

I'm always open to discussing new projects, collaborations, or opportunities. Feel free to reach out!

Email LinkedIn GitHub