About Me
Hello! I am a Cybersecurity Engineer with a strong foundation in network security, threat hunting, and application security. My approach combines deep theoretical knowledge with aggressive, hands-on continuous learning.
β‘ Core Competencies & Technical Skills
- Defensive Security & SecOps: Threat Hunting, Threat Intelligence, SIEM/SOAR Engineering (Splunk, Wazuh), EDR & XDR, Advanced SPL Queries, Endpoint Hardening (Sysmon, systemd), Digital Forensics (FTK Imager, HxD), Incident Response.
- Offensive Security & Red Teaming: Penetration Testing, Cloud Exploitation (AWS S3, DynamoDB), Privilege Escalation, Web App Vulnerabilities (OWASP Top 10), MITRE ATT&CK, Adversary Emulation (Atomic Red Team).
- Intelligence & OSINT: Passive Reconnaissance, Image Intelligence (IMINT/Geolocation), Data Breach Analysis, Maltego, Recon-ng, Automated Web Scraping.
- AI & Machine Learning: Local LLMs (Ollama, Llama 3.1), Agentic Workflows, Applied Data Science (CRISP-DM), Encrypted Traffic Analysis, Classification Models (Random Forest, Scikit-Learn).
- Cloud, Network & Infrastructure: AWS, Google Cloud (GKE, Cloud Armor), Docker, Active Directory, Linux / Kali Linux, Network Architecture (Cisco CCNA), Wireless Security (LANforge Wi-Fi), Wireshark, Nmap.
- Software Engineering, AppSec & DBs: Python (Automation,
psutil,BeautifulSoup), C++, Dart/Flutter, Bash, SPL, SQL, Django (Secure Architecture), Git (GitHub, GitLab), PostgreSQL, MySQL, Redis. - Governance, Risk & Compliance (GRC): NIST Framework, Risk Scoring (CVSS 3.1), Cloud Risk Assessment, Threat Modeling, Disaster Recovery Planning (DRP), Business Continuity (BCP), RTO/RPO Metrics.
- Soft Skills: Analytical Thinking, Problem-Solving, Adaptability, Time Management, Team Collaboration.
- Languages: English (B2), Polish (C1), Ukrainian (Native), Russian (Native).
π Featured Projects
AI-Powered SOC Automation
Developed a SOAR-like integration using Llama 3.1 and Wazuh to automate incident analysis and remediation, significantly reducing alert fatigue.
Read Case Study βAdvanced Threat Hunting Lab
Simulated APT29 tactics in a controlled environment using Splunk and Sysmon. Authored complex SPL queries to detect lateral movement.
Read Case Study βEncrypted Traffic Classification
Implemented ML models to identify malicious Command & Control (C2) patterns within DNS-over-HTTPS (DoH) traffic. Full implementation and research methodology available on GitHub.
View Repo & Code βDigital Forensics & Metadata Analysis
Developed custom Python tools for automated metadata extraction and performed raw hexadecimal analysis on forensic disk images to identify BitLocker encrypted volumes.
Read Case Study βCloud Infrastructure Penetration Test
Executed a full attack chain on a simulated cloud environment (HTB), exploiting AWS S3 misconfigurations and local DynamoDB instances to achieve root privilege escalation.
Advanced OSINT & Threat Reconnaissance
Conducted deep-dive passive reconnaissance using Python (BeautifulSoup), Recon-ng, and Maltego to map organizational attack surfaces, analyze data breaches, and perform IMINT geolocation.
Read Case Study βBusiness-Centric Cloud Risk Assessment
Conducted comprehensive risk analysis for a GCP-based e-commerce platform. Translated technical vulnerabilities into business impacts and designed Disaster Recovery (DRP) architectures utilizing Kubernetes and Cloud Armor.
Read Case Study βEngineering Thesis: Django AppSec
Researched and implemented 33 comprehensive security practices for Python/Django web applications, covering secure authentication, OWASP Top 10 mitigation, and hardened Nginx/SSL deployments.
Read Case Study βπ Formal Education
Developing an advanced master's thesis focused on AI-driven security orchestration and local LLM integration for automated SOC workflows.
Graduated in January 2025. Thesis focused on Web Application Security and implementing AppSec practices in Django.
π Industry Certifications
Comprehensive training in SIEM tools, IDS, Python automation, and threat mitigation.
Advanced enterprise network architecture, routing protocols, and automated security mechanisms.
Focus on securing network infrastructure, VPNs, and firewall configurations.
Applied Artificial Intelligence frameworks for business processes and growth automation.
π― Hands-On Labs & Specialized Training
Theory is only half the battle. I spend my free time actively exploiting vulnerabilities in controlled environments and studying specialized network protocols.
Practicing offensive security, SOC analysis, and network exploitation in real-world simulated environments.
View TryHackMe Profile βSpecialized training in advanced Wi-Fi performance testing, network emulation, and wireless security analysis.
π Hackathons & Workshops
Engaged in intensive two-day workshops focusing on digital forensics, incident response, and the intersection of AI/ML with cybersecurity.
Experienced in building AI-driven platforms from scratch and rapidly deploying local LLMs to solve complex problems in high-pressure environments.