I am a recent graduate in Cybersecurity with a strong foundation in security, network defense, and systems monitoring. I am passionate about applying analytical thinking to solve cybersecurity problems and ensure system resilience.
As a Meng Cybersecurity graduate, I aim to leverage my skills in incident response, SIEM tools, and cloud security to transition into a Security Engineer or Analyst.
| Skill | Associated Project |
|---|---|
| Network Traffic Monitoring and Attack Detection | ThreatScope |
| End-to-End Encryption (E2EE) and Secure Protocol design (CIA Triad) | E2EKeyEstablishmentProtocol |
| Threat Modelling and RisK Mitigation | E2EKeyEstablishmentProtocol |
| Cryptography and GUI Development | Wallet Recovery |
- ThreatScope: ThreatScope is an cybersecurity and machine-learning project that performs real-time network intrusion detection. It captures packets, computes flow-level statistics, applies a trained ML classifier (XGBoost), and logs malicious traffic through a REST API or SQLite database.
- Key Establishment Protocol: A protocol allowing three entities (A, B, C) to establish a mutually agreed session key, ensuring Confidentiality, Integrity, Availability, and Non–Repudiation.
- Wallet Recovery GUI: A GUI-based application for cryptocurrency wallet seed phrase recovery as part of my Master’s project.