My Projects
CYBER INTEL - THREAT INTELLIGENCE, MODELING AND RECONNAISSANCE
​
Developed a comprehensive Threat Intelligence Fusion Center plan addressing 15+ critical risks with tailored mitigation strategies to strengthen organizational security posture after conducting open-source reconnaissance on a Fortune 500 company and creating a detailed threat model with ranked assets and attacker profiles.​
​
View the full report here
​
Keywords ​
Threat Analysis, Threat Modelling, Threat Intelligence Gathering, Threat & Strategic Analysis and Reporting, MITRE ATT&CK, Fusion Center
THREAT INTELLIGENCE REPORT​
​
​Developed and presented an executive briefing and Threat Intelligence Report on the MGM resorts attack by Scattered Spider threat group, analyzing threat actor tactics, motives, vulnerabilities, and impact, with actionable recommendations to prevent future incidents.
​
View the full report here
​
Keywords ​
Threat Intel Report, Cyber Attacks, Tactics Techniques & Procedures
CYBERINT - CYBER NEWS AGGREGATOR​
​
​Spearheaded a python-based project for creating a cyber awareness news aggregator that will help employees within financial organizations to keep up with the latest cyber related news and alerts that occur in the financial sector. Utilized beautiful soup, numpy, sumy and SMTP tools to aggregate, summarize each article and send emails.
​
Watch the code demo here
​
Keywords ​
Threat Intel Report, Cyber Attacks, Tactics Techniques & Procedures
RESEARCH REPORT – SECURING THE INTERNET OF MEDICAL THINGS​
​
​Authored a research paper on cybersecurity challenges in the Internet of Medical Things (IoMT), analyzing vulnerabilities, high-profile incidents, and proposing solutions like secure design, real-time threat monitoring, and AI-driven predictive threat detection to enhance healthcare security.
​
View the full report here
​
Keywords ​
IoT, Vulnerability, Mitigations, Research Paper, Healthcare Security
WEBGOAT HACKING​
​
​Performed application security testing on WebGoat within UTM, identifying and mitigating OWASP Top 10 vulnerabilities using Kali Linux and BurpSuite (Repeater, Intruder). Developed mitigation strategies, integrated secure coding practices, and strengthened expertise in web security assessments and vulnerability management.
​
View the full report here
​
Keywords ​
Kali Linux, BurpSuite, OWASP Top 10
TESLA RISK MANAGEMENT POLICY AND PROCEDURE​
​
​Designed and implemented an asset management and risk governance framework using the OCTAVE FORTE methodology. Identified and classified critical services and information assets, and developed detailed asset profiles including ownership, sensitivity, value, and impact. Performed structured risk assessments by mapping threat scenarios to impact areas and selecting appropriate risk response strategies. Created supporting documentation such as RACI matrices, impact severity tables, and risk policy guidelines for executive-level review and compliance alignment.
​
View the full report here
​
Keywords ​
OCTAVE FORTE, OCTAVE ALLEGRO, Risk Management, Risk Assessment, Asset Security, Asset Management, Risk Policy, Compliance
ETHICAL PENETRATION TESTING​
​
​Conducted ethical penetration testing of a simulated enterprise network (Jupiter), identifying and exploiting 13 critical vulnerabilities across 10 hosts using tools such as Metasploit, Nessus, SQLMap, WPScan, and Nikto. Exploited CVEs including BlueKeep (CVE-2019-0708), EternalBlue (CVE-2017-0144), Shellshock (CVE-2014-6271), and SQL injection. Gained privileged access via default credentials, insecure code, and authentication bypass techniques. Delivered actionable remediation recommendations aligned with CVSS standards.
​​​
Keywords ​
Kali, Metasploit, Nessus, Nmap, SQLMap, Nikto, WPScan, SQLi, Vulnerability, CVE
REAL-TIME AIR QUALITY PREDICTOR WITH KAFKA AND ML-DRIVEN APIS​
​
​Developed a real-time air quality forecasting pipeline using Kafka, Docker, MLflow, and FastAPI to predict CO(GT) levels from UCI dataset; implemented producer-consumer architecture for streaming, feature engineering (lags, rolling stats), model training (XGBoost, Random Forest, LSTM), and deployment in containerized API with 92.8% MAE improvement over baseline; ensured reproducibility with MLflow tracking and tackled integration/debugging across environments
​
View the full report here
​
Keywords ​
Kafka, Docker, MLflow, FastAPI, XGBoost, Random Forest