Hey 👋

Aspiring cybersecurity professional from Toronto 🇨🇦

I'm passionate about exploring problems, troubleshooting solutions, and working with new technologies. Always learning, always growing!

Trent University logo
Jan 2024 - July 2024

Trent University

Help Desk Support
  • Spearheaded the implementation of email filtering protocols in Outlook, significantly reducing phishing attempts and enhancing university-wide security awareness
  • Initiated and streamlined a weekly reporting process for phishing activities, improving incident response time by 30% and strengthening overall security monitoring
Callnow 24x7 logo
April 2018 - June 2018

Callnow 24x7

Technical Support
  • Troubleshot and resolved network issues, achieving an 80% success rate in restoring services and minimizing downtime for local businesses
  • Delivered effective technical support for hardware, software, and network challenges, ensuring smooth operations and high client satisfaction using Microsoft Server and PowerShell
Enterprise Network Vulnerability Assessment (Nessus) logo
Nov 2024 - Dec 2024

Enterprise Network Vulnerability Assessment (Nessus)

Penetration Testing
  • Conducted a comprehensive security assessment of a virtual enterprise network using Nessus
  • Identified, categorized, and remediated high-risk vulnerabilities to improve overall network security posture
  • Mapped findings to CIS Benchmarks and security frameworks for risk management
Vulnerability ScanningRisk AssessmentSecurity HardeningComplianceCIS,NIST
Security Information and Event Management (SIEM) Setup logo
June 2024 - Aug 2024

Security Information and Event Management (SIEM) Setup

Application Security
  • Deployed Security Onion to monitor, analyze, and detect security events
  • Created custom correlation rules to detect anomalies and suspicious behavior in log data
  • Built a real-time dashboard for threat intelligence and alert monitoring
SIEMLog AnalysisEvent CorrelationIncident Detection
Network Traffic Analysis using Wireshark logo
Jan 2024 - Feb 2024

Network Traffic Analysis using Wireshark

Application Security
  • Captured and analyzed network packets using Wireshark to detect malicious traffic and potential cyber threats
  • Investigated unusual traffic patterns, including DDoS attempts, ARP spoofing, and unauthorized access
  • Documented findings in an incident response report with recommendations
Packet AnalysisThreat DetectionNetwork ForensicsIntrusion Analysis