Defining the Future.
My work extends beyond implementation into the realm of Novel Research. Formulating frameworks and designing the security companies of tomorrow.
01 // PUBLISHED_WORKS
The PRCIM Framework
Proactive Resilience for Cloud Identity Management: Integrating AI-driven anomaly detection with Zero Trust to eliminate "Authorized User" fraud.
Digital Forensic Processes
Critical Appraisal of Methodologies for the Collection and Analysis of Digital Evidence.
Zero Trust Compliance
Bridging the gap between dynamic security controls and static regulatory requirements.
AI-Driven Security Ops
The intersection of Large Language Models and proactive threat hunting within the SOC.
02 // ACADEMIC_CORE
Core competencies from my MSc in Cloud and Network Security at the University of Bolton.
03 // PENTESTING_&_FORENSICS
A deep dive into Offensive Security and Digital Forensics. Demonstrating practical application of industry frameworks (NIST, ISO) and tools (Autopsy, Snort, Metasploit) to simulate real-world attack and response scenarios.
Forensic Methodologies & Frameworks
A critical appraisal of NIST SP 800-86, ISO/IEC 27037, and ACPO guidelines. Establishing a legally defensible chain of custody for digital evidence.
Investigation: The Hacked Server
Forensic analysis of a compromised Windows IIS server. Recovering deleted artifacts, analyzing registry keys, and reconstructing the attack timeline using Autopsy.
Network Intrusion Detection System
Deploying Snort and Fail2ban to detect and block brute-force attacks in real-time. Writing custom signatures for ICMP tunneling and TCP scanning.
Penetration Testing with Metasploit
Exploiting PostgreSQL and SSH vulnerabilities to gain root access. A step-by-step walkthrough of the kill chain from enumeration to privilege escalation.
Autonomous Cloud Governance
Moving beyond incident response to Automated Infrastructure Hardening. My research roadmap drives a vision for systems that continuously self-audit against CIS/NIST standards and auto-remediate misconfigurations before they become breaches.
// AI_&_LLM_SECURITY
Developing frameworks for the secure deployment of LLMs (e.g., SageMaker, Bedrock), tailored to NIST AI RMF and OWASP standards to prevent prompt injection and data leakage.
// ZERO_TRUST_IAM
Architecting NIST 800-207 compliant identity engines that utilize dynamic risk scoring to enforce automated permission boundaries in real-time.
// COMPLIANCE_AS_CODE
Codifying evidence collection for SOC 2 Type II & ISO 27001, transforming compliance from a manual audit to a continuous integration pipeline.