Initializing cybersec portfolio...
Cybersecurity & AI Pro
$ whoami
Cybersecurity & AI professional — securing systems, one threat at a time.
Get to know me better
Results-driven Cybersecurity & AI professional with hands-on experience in penetration testing, threat analysis, network security, and secure system design. IBM Certified in Cybersecurity with a Master's in Information Studies. Proven track record maintaining PCI DSS compliance, implementing SSL/WAF security controls, and conducting vulnerability assessments. Passionate about applying skills in incident response, SIEM monitoring, and threat intelligence to protect organizations from evolving cyber threats.
Contact MeExperience
Companies Served
Publications
Certifications
Technical proficiency
My professional journey
Monitor and analyze cybersecurity events to detect threats, anomalies, and potential incidents in real time. Support implementation of security protocols and controls, conduct vulnerability assessments, and collaborate with IT teams to remediate security gaps. Maintain accurate security documentation and incident reports.
Maintained 100% PCI DSS compliance across all digital payment channels with zero security breaches. Monitored and secured transaction systems, resolved 95% of issues independently, conducted daily transaction audits and anomaly detection with 100% accuracy, and ensured 99.9% uptime through proactive maintenance.
Reduced system downtime by 15% through proactive monitoring and root cause analysis. Documented system errors for weekly management review, driving a 20% efficiency improvement.
Managed sensitive client data and payment systems with 100% service continuity (SalesForce). Boosted policy sales by 25% and improved client retention by 15%.
Led a team of 5 engineers, delivered projects 5% ahead of schedule with a 10% efficiency gain. Troubleshooting of the software.
Built secure, responsive web applications; drove 30% traffic growth and 20% client satisfaction improvement.
Academic background
Research & academic contributions
Security & engineering work
Conducted hands-on pentesting in an authorized lab environment — identified exposed services, performed network enumeration, validated critical findings, and produced a structured remediation report using industry-standard tools.
Implemented SSL, secure payment gateways, and WAF on live e-commerce site TookTaakShop.com — ensuring PCI DSS-aligned security for real transactions.
Threat detection, pentesting, vulnerability assessment, and mitigation across various environments — documented findings and actionable remediation strategies.
Built a Smart Home prototype using C, Arduino IDE, and circuit design — automating gate control and device operation through a connected interface with IoT-style sensor integration. Associated with Kyungsung University.
Developed a Smart Shopping Cart prototype with card-based access, automatic cart-following, and secure transaction concepts — combining embedded systems, IoT control, and smart retail technology. Associated with Kyungsung University.
Real-time sensor-based decision systems for autonomous navigation and obstacle avoidance — integrating hardware control logic and embedded programming for reliable independent operation.
Designed a robot capable of climbing stairs via a mechanically adaptive wheel system — combining mechanical design, brushless motor control, circuit integration, and C/Python programming. Associated with Kyungsung University.
Built a small robot capable of dance-based movements through programmed control logic — combining motion control, circuit connection, and actuator-based motion into a fully working prototype. Associated with Kyungsung University.
Professional credentials
Industry-standard security certification covering threat detection, network security, cryptography, identity management, and risk mitigation — SY0-701 exam. Issued April 26, 2026.
Network Security, Penetration Testing, Cryptography — IBM Certified (2025).
Certified ethical hacker with hands-on penetration testing and exploitation skills.
Certified in web development with a focus on secure, responsive applications.
Capstone Design Competition Winner — outstanding engineering achievement.
What I offer
Simulated cyberattacks to identify and exploit vulnerabilities, helping assess your security posture and protect data and assets from malicious actors.
Monitoring, analyzing, and responding to security incidents in real time — a proactive approach to identify threats, mitigate risks, and enhance overall security posture.
Deep-dive threat analysis including IDS/IPS, firewall configuration, and SIEM monitoring to detect anomalies and prevent breaches before they occur.
Systematic identification and evaluation of security weaknesses across systems and networks, with documented findings and actionable remediation steps.
Securing routers, switches, firewalls, and wireless infrastructure — including SSL/TLS, WAF, and PCI DSS compliance to protect data in transit.
Rapid identification, containment, and recovery from security incidents — minimizing impact and preventing recurrence through thorough post-incident analysis.
Gathering and analyzing publicly available information to detect security threats, enhance threat detection, and support risk mitigation efforts.
Securing IoT architectures with robust access controls, encryption, and automated threat detection to protect connected devices and data.
Applying Python-based machine learning for automated threat detection, predictive analytics, and adversarial defense across cybersecurity domains.
Let's work together