IT Projects

Showcasing innovative solutions in cybersecurity and cloud technologies.

A person wearing a Guy Fawkes mask is positioned near a server rack filled with blue and green cables and illuminated lights. The individual is dressed in a dark-colored suit and is close to the camera.
A person wearing a Guy Fawkes mask is positioned near a server rack filled with blue and green cables and illuminated lights. The individual is dressed in a dark-colored suit and is close to the camera.
Network Security

Implemented firewall solutions for enhanced network protection measures.

A hand holds a smartphone displaying a cryptocurrency portfolio with various assets including Decentraland, Ethereum, Bitcoin, Algorand, and Polygon. The balance for each asset is shown alongside icons representing each cryptocurrency.
A hand holds a smartphone displaying a cryptocurrency portfolio with various assets including Decentraland, Ethereum, Bitcoin, Algorand, and Polygon. The balance for each asset is shown alongside icons representing each cryptocurrency.
Vulnerability Assessment

Conducted thorough assessments to identify security weaknesses effectively.

A closed padlock rests on top of a computer keyboard, symbolizing security. The image incorporates a motion blur effect, suggesting speed or data movement.
A closed padlock rests on top of a computer keyboard, symbolizing security. The image incorporates a motion blur effect, suggesting speed or data movement.
A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
Cloud Security

Developed strategies to secure cloud-based applications and data.

Incident Response

Managed security incidents to minimize impact and restore services.