top of page
Screenshot 2025-07-02 at 7.53.59 PM.png

Projects

Welcome to my cybersecurity portfolio. This space chronicles my journey from foundational academic principles to their direct application in solving complex security challenges. As a dedicated student in the Bellevue College Cybersecurity program, my approach is defined by a commitment to translating theoretical knowledge into tangible, operational solutions. Each project featured here is a deliberate step in building the practical expertise required for modern defense, blending curriculum-driven learning with independent exploration.

The work presented bridges critical, interconnected domains in the security landscape:

  • Security Operations & Defense: Focusing on the proactive and reactive pillars of SecOps, including automating threat detection pipelines, conducting in-depth log analysis with tools like SIEM platforms, and implementing system hardening protocols to reduce attack surfaces.

  • Cloud & Network Security: Centered on architecting and securing modern environments. This encompasses designing and deploying secure, resilient infrastructures in AWS following the Well-Architected Framework, and performing tactical network traffic analysis to identify anomalies and potential intrusions.

  • Security Tooling & Automation: Emphasizing efficiency and scalability through code. I develop scripts and tools in Python and Bash to automate repetitive security tasks, parse complex datasets, and extend the functionality of existing security platforms.

​

My Project Methodology:
For every project, I adhere to a structured approach that ensures clarity, replicability, and meaningful outcomes. You can expect to find:

  1. Clear Objectives: A definition of the problem statement and the specific security goals the project aims to address.

  2. Detailed Process Walkthrough: A step-by-step account of the implementation, from planning and design through execution and testing, including any challenges encountered and overcome.

  3. Technology Stack: A transparent listing of all tools, languages, frameworks, and platforms utilized (e.g., Python, Bash, AWS EC2/S3/IAM, Wireshark, Splunk, ELK Stack).

  4. Critical Reflection & Outcomes: An analysis of the results, the skills acquired or honed, and insights into how the project illuminates broader security concepts. I document not just what was built, but what was learned.

I am a strong advocate for transparency and collaborative learning in the security community. Therefore, the complete codebase, configuration examples, and detailed documentation for each project are available in my GitHub repositories. I invite you to explore, examine the technical specifics, and welcome any feedback or discussion on the work presented here.

  • LinkedIn
  • GitHub

©2025 Vivian J. Goshashy. Proudly created with Wix.com

bottom of page