I'm a Security, Cloud, Ai and DevOps Engineer with hands-on experience in building, automating, and securing IT infrastructures. I specialize in:
- π Offensive & Defensive Security
- βοΈ Secure Cloud Deployments
- π DevOps Automation & CI/CD
- π§ AI-Powered Infrastructure
With a background in ethical hacking and modern AI-Cloud workflows, I bring together security, automation, and research to solve complex IT challenges.
- π EduQual accredited RQF level 6 Diploma in AiOps, Emerging Technologies(equivalent to a Bachelor's degree in the UK)
These are some of the tools and technologies I have worked with in one way or another across different projects, labs, and environments:
Hereβs what Iβm building & sharing here on GitHub:
-
Raw notes from my diploma and hands-on learning in AI, DevOps, Security, and Cloud.
-
Same notes, better format, inline images, toggles, and navigation.
Useful scripts, automation playbooks, and CLI tools Iβve written:
-
My earliest ethical hacking projects β login forms, captive portals, and phishing page simulations.
-
A Python+Selenium automation script to extract folder names from Mega links and pair them with the original URL.
-
Automates secure SSH access setup with dynamic public key handling, OS detection, and security hardening.
Hands-on demos, labs, and case studies:
A Kubernetes-based 3-tier application demo (Nginx + Flask + MySQL) using ConfigMaps, Secrets, Liveness Probes, Scaling, and Minikube.
Simple Flask web app deployed using AWS CodePipeline & CodeDeploy, with EC2 automation via shell scripts.
containerized Flask microservice with PostgreSQL using Podman Compose, Includes secrets .
-
A full Kubernetes CI/CD pipeline, automating container test build and deployment using Github Actions.
-
A handsβon project demonstrating GitOps principles for Kubernetes deployments using Argoβ―CD: automated syncs, updates, failure handling, and rollbacks.
-
Comprehensive CI/CD pipeline automating a Node.js application delivery with Jenkins, Docker, SonarQube, Trivy, and deployment on GCP. Includes building, testing (unit + integration), static code analysis, vulnerability scanning, containerization, and automated deployment.
-
Observability stack for Kafka ecosystem (Docker Compose: Kafka, Zookeeper, Python apps) integrated with Datadogβincludes JMX metrics, unified logs, and monitoring dashboards.
-
End-to-end ML model deployment via a Flask API, fully containerized and secured with a Jenkins-driven DevSecOps pipeline. Features automated linting (Flake8 + Black), static code analysis (Bandit), container vulnerability scanning (Trivy), optional secret scanning, SBOM generation, and deployment to a staging environment.
During my Journney; Diploma, labs and other things i did, I focused heavily on SysOps, Cloud, and AI.
While I didnβt maintain GitHub repos at that time, I created detailed documentation of everything I practiced.
These notes serve as a record of my hands-on experience and learning journey.
Over time, I gained extensive hands-on experience in SysOps and Linux administration.
The more time you spend in this field, the more you understand the depth and power of Linux β and I made sure to document that progression in detail.
These notes reflect real work, configurations, and troubleshooting:
Similar to SysOps, My Cloud journey is fully documented in Notion, including projects i implemented in Diploma and Projects:
I explored AI concepts, model fine-tuning, and edge deployments as part of my learning track.
Notes include theory + practical lab steps (almost like projects):
-
A dedicated repo showcasing hands-on Linux security implementations. Covers:
- Identity & Access Management (FreeIPA on GCP)
- Mandatory Access Control (SELinux)
- File Integrity & Intrusion Detection 8(AIDE)*
- System Auditing & Logging (Auditd)
- TLS-based Secure Communication
- Automated Hardening with Ansible Playbooks
-
An intelligent fuzzer that uses the Google Gemini API to generate smart wordlists for
ffuf, inspired by Brainstorm (Invicti Security). -
A forensic analysis of a real phishing email (.eml) uncovering Microsoft credential theft through IoC extraction, header tracing, and infrastructure abuse detection.
-
SOC-style investigation of a malicious pcap using Snort, Wireshark, and tcpdump to detect QakBot activity, lateral movement, and credential theft patterns.
-
A SOC-style project demonstrating how to detect malicious persistence on Windows systems using SysInternals Autoruns and PowerShell baselines.
I created a clean baseline, simulated attacker persistence usingreg add, and compared snapshots to identify unauthorized autoruns β including module verification, unsigned binaries, and MITRE ATT&CK mapping (T1547.001). -
Built a fully automated detection and response pipeline integrating Wazuh (SIEM), Shuffle (SOAR), and TheHive. Engineered custom detection rules for Mimikatz credential dumping using Sysmon telemetry, and implemented an automated workflow to enrich alerts with VirusTotal and dispatch notifications to analysts.