About Me
I am a dedicated Cyber Security Engineer with over 3 years of specialized experience in the field and nearly 9
years as a Software Developer. Currently, I'm advancing my expertise in Cyber Security through a Master's
program in Cyber Security and Artificial Intelligence. My ultimate goal is to stay at the forefront of the
ever-evolving landscape of computer science, ensuring that cyber security measures adapt seamlessly with
technological advancements.
Presently, I serve as a Cyber Security Consultant at RSU Consultancy, where I utilize both my foundational
knowledge of cyber security principles and my expertise in current programming languages and engineering
practices.
- I possess a natural desire to consistently develop new skills.
- Regardless of the challenge, I am committed to extracting the best outcomes from every situation.
- Outside of my professional endeavors, I take keen interest in solving Capture The Flag (CTF) challenges
during my leisure.
By blending my software development background with my current focus in cyber security, I aim to develop and
implement robust solutions that are not only functional but also secure against emerging threats.
What I'm Doing
-
Cybersecurity
A cybersecurity expert takes measures to protect information systems, networks, and data from malicious attacks, theft, and damage, and detects and responds to security breaches.
-
Application Penetration Testing
Application Penetration Testing involves simulating cyber attacks on applications to identify vulnerabilities and security weaknesses, ensuring the application's defenses are effective against potential threats.
-
Artificial Intelligence (AI)
AI development encompasses the creation and training of algorithms and computational models to enable machines to perform tasks requiring human-like intelligence, including learning, decision-making, and problem-solving.
-
Consultancy
Providing expert guidance on safeguarding digital assets against cyber threats and utilizing artificial intelligence technologies for improved security protocols and operational effectiveness.