Professional Profile
Self-driven cybersecurity expert specializing in cloud infrastructure protection, threat analysis, and secure system architecture. With a passion for creating impenetrable digital environments and a track record of successful implementations across diverse industries. Committed to ethical practices, responsible disclosure, and empowering others with knowledge to foster a safer cyberspace.
Core Competencies
Azure Security
Defender for Endpoint, Sentinel, Identity Protection, and Cloud Posture Management. Focus on defensive strategies to protect user privacy and data integrity.
Threat Protection
MITRE ATT&CK framework, SIEM solutions, and behavioral analysis. Emphasizing ethical hacking methodologies for vulnerability identification without exploitation.
Network Security
Zero Trust Architecture, VPN configurations, and advanced firewall management. Promoting equitable access to secure networks for all users.
Compliance
ISO 27001, NIST frameworks, GDPR, and industry-specific regulations. Ensuring adherence to global standards for fair and just cybersecurity practices.
Ethical Hacking
CEH principles for reconnaissance, scanning, and enumeration. Prioritizing defense over offense to safeguard systems and promote responsible disclosure.
Privacy Protection
Encryption techniques, anonymization, and data minimization. Educating on GDPR compliance and privacy-by-design to protect individual rights.
Enterprise Security Solutions
1. Hybrid Infrastructure Protection
Network
Zero Trust Segmentation
Endpoints
Unified EDR/XDR
Cloud
CASB + CSPM
Identity
Conditional Access
Data
Encryption & DLP
Monitoring
SIEM & Analytics
2. Zero-Day Response Protocol
Detection
SIEM alerts, EDR telemetry, and threat intelligence feeds. Use CEH-inspired scanning to identify anomalies early.
Triage
Initial assessment using MITRE ATT&CK framework. Prioritize based on impact to human safety and data privacy.
Containment
Network segmentation, endpoint isolation, credential rotation. Minimize harm through swift, ethical actions.
Eradication
Patch deployment, malware removal, system hardening. Align with CEH standards for thorough vulnerability mitigation.
Recovery
System restoration from clean backups, validation testing. Ensure equitable recovery for all affected parties.
Lessons Learned
Post-incident review and process improvement. Share knowledge responsibly to build community resilience.
Disclosure
Responsible reporting to vendors and stakeholders. Promote transparency while protecting vulnerable systems.
3. Security Frameworks
MITRE ATT&CK
Adversary tactics and techniques framework for threat modeling
- Threat intelligence integration
- Detection rule development
- Red team exercises
- Mapping to CEH methodologies
NIST CSF
Identify, Protect, Detect, Respond, Recover framework
- Risk assessment methodology
- Security controls mapping
- Maturity benchmarking
- Privacy enhancement focus
CIS Controls
Prioritized set of actions for cyber defense
- Implementation Groups
- Configuration benchmarks
- Hardening guidelines
- Equitable access recommendations
ISO 27001
International standard for information security management
- Risk treatment plans
- Audit and certification
- Continuous improvement
- GDPR alignment
4. Threat Risk Matrix
5. For 100 Users & 200 Devices
Professional Journey
Freelance Cybersecurity Consultant
Performed pentesting, incident response, and security training for SMBs and NGOs. Delivered risk-based reports and improved client defenses via OWASP/NIST-aligned strategies, emphasizing ethical disclosure.
Senior Engineer for Cloud & Infrastructure – Microsoft Project
Implemented Defender for Endpoint, EDR, SIEM, and Identity Protection. Reduced threat exposure and educated teams on latest threat intel and mitigation tactics, fostering collaborative defense.
Support Engineer – Intellias
Led cloud migration across 5 EU regions. Managed Azure resources, SLAs, policy enforcement, and authored technical documentation and procedures, ensuring GDPR compliance.
IT Specialist – Cinema City
Rebuilt regional IT infrastructure. Delivered OS deployments (Debian/Win), supported POS systems, and enforced backup/recovery procedures with a focus on data protection.
Platform Engineer – Discovery
Handled SIEM ops via Splunk and SolarWinds. Authored automation scripts and participated in incident bridges and recovery plans, promoting team brotherhood.
NOC Engineer – Sperasoft
24/7 infrastructure monitoring. Produced SOPs, ran escalations, and participated in collaborative network response workflows for equitable security.
Enterprise Operation Center Analyst – Grand Parade / William Hill
Led vulnerability scans, threat hunting, patch management, and awareness training. Created incident response scenarios aligned with CEH principles.
Junior Network Specialist – Emitel SA
Maintained MPLS and SDH links. Resolved Cisco-related issues, handled Jira tickets, and configured VPN and signal systems with privacy considerations.
Security Intern – Local Firm
Assisted in basic audits and learned CEH fundamentals. Contributed to team efforts in building defensive strategies for small businesses.
Service Specialist NOC – Horsebridge
Monitored enterprise level distributed network using PRTG, Ruckus, BlueSocket, Radwin, WireShark, ZenMap. Resolved incidents, escalated issues, and maintained ISO 9001 standards.
Telecommunication Engineer – BT Openreach
Provided telephone and broadband services, performed circuit mapping, jumper wire routing, and ensured compliance with health and safety principles and quality standards (ISO 9001).
IT Support (1st/2nd line) – First Red Midland Buses
Managed IT equipment installation and maintenance, provided desktop and server support, ensured antivirus compliance, and handled Exchange server maintenance.
IT Technician – M1 - REAL Ltd
Installed and maintained IT equipment, supported POS systems, generated sales reports using Oracle Discoverer, performed MySQL queries, and managed daily backups on multiple servers.
Certifications
Committed to continuous learning and upholding the highest standards in cybersecurity. These certifications reflect expertise in ethical hacking, protection strategies, and compliance.
Certified Ethical Hacker (CEH)
EC-Council. Mastery in ethical hacking methodologies, vulnerability assessment, and defensive techniques to protect systems responsibly.
CompTIA Security+
Foundational knowledge in network security, compliance, and operational security. Emphasizes practical skills for entry-level protection.
Microsoft Azure Security Engineer Associate
Expertise in implementing security controls, maintaining security posture, and protecting data in Azure environments.
CISSP (In Progress)
ISC2. Advanced certification covering security and risk management, asset security, and communication protection.
AWS Certified Security - Specialty
Specialized in designing and implementing security solutions on AWS, focusing on data protection and incident response.
Cybersecurity Resources
To empower everyone with knowledge, here are free and accessible resources for learning cybersecurity. These align with CEH principles and promote equitable access to education for a just cyberspace.
- TryHackMe - Hands-on labs for beginners to advanced ethical hacking.
- Cybrary - Free courses on CEH, penetration testing, and defensive strategies.
- OWASP - Community-driven resources for web application security and vulnerability management.
- SANS Institute - Free cheat sheets and webinars on threat intelligence and incident response.
- NIST Cybersecurity Framework - Guidelines for improving organizational security posture.
- EC-Council CEH - Official resources for ethical hacking certification preparation.
- PortSwigger Web Security Academy - Free interactive lessons on web vulnerabilities.
Remember, use these tools defensively to protect yourself and others. Always obtain permission before testing systems.
Cybersecurity Awareness Quiz
Test your knowledge with this interactive quiz inspired by CEH concepts. It's designed for all levels to promote learning and awareness in a supportive way.
Question 1: What is the first phase of ethical hacking in CEH?
Question 2: Which practice best protects against phishing?
Question 3: What does responsible disclosure mean?
Question 4: Why is encryption important for privacy?
Question 5: What framework helps map adversary tactics?
Interactive Terminal
Try some Kali OS commands (simulated). Expanded with educational commands on CEH concepts and defensive tips:
Contact
For professional inquiries, please contact me via email: