
Projects
Welcome to my cybersecurity portfolio. This space chronicles my journey from foundational academic principles to their direct application in solving complex security challenges. As a dedicated student in the Bellevue College Cybersecurity program, my approach is defined by a commitment to translating theoretical knowledge into tangible, operational solutions. Each project featured here is a deliberate step in building the practical expertise required for modern defense, blending curriculum-driven learning with independent exploration.
The work presented bridges critical, interconnected domains in the security landscape:
-
Security Operations & Defense: Focusing on the proactive and reactive pillars of SecOps, including automating threat detection pipelines, conducting in-depth log analysis with tools like SIEM platforms, and implementing system hardening protocols to reduce attack surfaces.
-
Cloud & Network Security: Centered on architecting and securing modern environments. This encompasses designing and deploying secure, resilient infrastructures in AWS following the Well-Architected Framework, and performing tactical network traffic analysis to identify anomalies and potential intrusions.
-
Security Tooling & Automation: Emphasizing efficiency and scalability through code. I develop scripts and tools in Python and Bash to automate repetitive security tasks, parse complex datasets, and extend the functionality of existing security platforms.
​
My Project Methodology:
For every project, I adhere to a structured approach that ensures clarity, replicability, and meaningful outcomes. You can expect to find:
-
Clear Objectives: A definition of the problem statement and the specific security goals the project aims to address.
-
Detailed Process Walkthrough: A step-by-step account of the implementation, from planning and design through execution and testing, including any challenges encountered and overcome.
-
Technology Stack: A transparent listing of all tools, languages, frameworks, and platforms utilized (e.g., Python, Bash, AWS EC2/S3/IAM, Wireshark, Splunk, ELK Stack).
-
Critical Reflection & Outcomes: An analysis of the results, the skills acquired or honed, and insights into how the project illuminates broader security concepts. I document not just what was built, but what was learned.
I am a strong advocate for transparency and collaborative learning in the security community. Therefore, the complete codebase, configuration examples, and detailed documentation for each project are available in my GitHub repositories. I invite you to explore, examine the technical specifics, and welcome any feedback or discussion on the work presented here.
