Implementing Zero Trust, RBAC, and security best practices across Microsoft cloud environments.
Securing users and devices using Intune, Conditional Access, and identity protection policies.
Improving Secure Score and tuning Defender-based security controls for ongoing protection.
Set up a cloud-based vulnerable machine with firewall rules to simulate attacks, analyse logs in real-time, and visualise global hacking attempts using an IP geolocation world map.
Developed a Bash-based Nmap automation tool to streamline network reconnaissance, featuring customisable scan profiles, efficient service detection, and automated output logging for penetration testing workflows.
Conducted a simulated penetration test, documenting vulnerabilities, exploitation steps, and remediation strategies with a detailed technical appendix for deeper insight.
Designed and configured a secure enterprise-level network in Cisco Packet Tracer, implementing VLAN segmentation, ACLs, and redundancy to simulate real-world network hardening