Cybersecurity Engineer · CTF Finalist · Pentest Specialist_
I break systems professionally — then fix them better than they were. Third-year cybersecurity student and junior security engineer who finds elegance in a clean exploit chain and sleeps soundly knowing firewalls are watching. Currently defending networks at Miabé Innovation while studying full-time at IPNET. Introvert by nature, loud by exploit.
An immersive, autonomous cyber defense platform designed as a "central nervous system" for enterprise infrastructure — detecting, classifying and responding to threats in real time without constant human intervention.
End-to-end design, deployment and security testing of an enterprise Active Directory infrastructure — from initial forest architecture through attack simulation and remediation.
Designed and deployed a complete Unified Threat Management solution for IPNET's annual open day event, protecting live demonstrations and sensitive institutional infrastructure.
Founded H1v3 Security on LinkedIn as a platform for sharing practical cybersecurity knowledge, CTF writeups, threat intelligence insights and career guidance for emerging African security professionals.
25 hands-on cybersecurity projects spanning network defense, offensive operations, digital forensics, cloud security and AI-powered threat detection — each built and tested in an isolated environment.
Complete home cybersecurity lab with VLAN-segmented network, virtualized infrastructure (VMware/Proxmox) and isolated attack/defense environments for hands-on training.
View Details →Enterprise-grade firewall deployment with granular rule sets, QoS optimization, SSL inspection and compliance-ready audit logging for PCI-DSS and SOX environments.
View Details →Deep packet inspection and network traffic forensics with Wireshark, custom Python dissectors, automated anomaly detection and protocol analysis scripts.
View Details →Enterprise multi-layer IDS/IPS architecture with custom Snort/Suricata signatures, automated incident response playbooks and full SIEM integration.
View Details →Comprehensive VPN management with automated PKI certificate lifecycle, OpenVPN/IPSec dual-stack support, Ansible-driven deployment and compliance monitoring.
View Details →Enterprise Zero Trust network with microsegmentation, Network Access Control (NAC), automated policy enforcement and full visibility via GNS3/Terraform IaC.
View Details →Enterprise WiFi security with WPA3 implementation, 802.1X/RADIUS authentication, wireless intrusion detection and PCI-DSS-compliant guest network isolation.
View Details →Full enterprise IAM solution with Active Directory, SSO (SAML 2.0/OAuth 2.0), MFA, Privileged Access Management and automated Zero Trust compliance frameworks.
View Details →Multi-cloud security governance with policy-as-code, automated compliance scanning, Cloud Security Posture Management (CSPM) across AWS, Azure and GCP.
View Details →Enterprise CTI platform aggregating multiple threat feeds with STIX/TAXII standards, ML-powered classification and automated threat hunting capabilities.
View Details →Isolated sandbox for comprehensive malware analysis — static, dynamic and behavioral — with YARA rule authoring, automated sandboxing and threat intel correlation.
View Details →Structured penetration testing framework following OWASP, PTES and NIST standards — covering web, network, wireless and mobile with automated professional reporting.
View Details →Complete web app security testing framework covering OWASP Top 10 2021 and ASVS 4.0 with automated scanning, manual exploitation and professional reporting.
View Details →End-to-end DFIR framework following NIST SP 800-86 and SANS methodology for evidence acquisition, timeline reconstruction and legally admissible incident reporting.
View Details →Advanced red team framework simulating nation-state APT campaigns with C2 infrastructure, lateral movement techniques and comprehensive MITRE ATT&CK coverage.
View Details →Custom exploit development covering stack-based buffer overflow, heap exploitation, ROP chain construction, ASLR/DEP bypass and weaponized payload creation from scratch.
View Details →Comprehensive social engineering simulation with phishing campaigns, vishing scenarios, pretexting playbooks and measurable security awareness impact analysis.
View Details →GPU-accelerated password security audit suite with Hashcat/JtR, custom wordlists, rule-based mask attacks, hash identification and policy compliance testing.
View Details →Modular forensic toolkit covering disk, memory, network and mobile forensics with timeline analysis, AI-powered artifact correlation and automated reporting.
View Details →Advanced SOC platform with proactive threat hunting, ML-powered behavioral analytics, Sigma rule deployment and orchestrated SOAR incident response workflows.
View Details →AI/ML cybersecurity platform with deep learning anomaly detection, NLP-powered log analysis, automated threat intel extraction and predictive security analytics.
View Details →Blockchain security and crypto forensics with transaction graph analysis, smart contract vulnerability auditing (Slither/Mythril) and DeFi threat monitoring.
View Details →Automated vulnerability discovery platform combining intelligent recon, Nuclei-powered scanning and structured bug bounty program management workflows.
View Details →Complete DevSecOps pipeline with integrated SAST/DAST analysis, container security scanning, dependency auditing and automated compliance enforcement across CI/CD.
View Details →Industrial IoT security platform with digital twin simulation, explainable AI (XAI) anomaly detection, global orchestration and immersive VR/AR security training interfaces.
View Details →This portfolio was assembled in support of my application to the International Cybersecurity & Digital Forensics Academy at the Associate Member grade — recognizing early-career professionals with foundational knowledge and demonstrated industry impact.
My profile bridges the gap between academic training and real-world security operations: I've deployed live infrastructure, competed nationally, earned hands-on certifications and actively contribute to the security community through H1v3 Security.
Whether you're a recruiter, a fellow security researcher, or just curious about what goes on behind the firewall — I'm reachable. Preferably through secure channels, obviously.
Follow along on LinkedIn for CTF writeups, threat analysis breakdowns, and practical security tips from the field — no fluff, no paywalls, just craft.
Follow H1v3 Security →