Cybersecurity analyst possessing extensive expertise in electronics and programming, specializing in system architecture, threat modeling, and vulnerability analysis, transitioning from embedded systems engineering.
Computer network design for Company X
1. The completion of this project involved creating a scaled plan for an office building
2. Estimating the subnetting requirements
3. Calculating IP address ranges
4. Implementing the project in Cisco Packet Tracer
Vulnerability assessment lab using VMware and VirtualBox
1. Designed and configured a virtual lab environment using VMware and VirtualBox, with Kali Linux as the attacking machine, and multiple vulnerable VMs (e.g., Metasploitable, DVWA)
2. Performed port scanning and service enumeration using tools such as Nmap and Netcat to map the attack surface
Real-time detection and classification of traffic signs using Jetson Nano
1. Training the model using YOLOv8 and a dataset of approximately 50,000 images, grouped into 27 categories, 2. Implementing the code for testing with a webcam and for video streaming
3. Importing and adjusting the implementation to run on the Jetson Nano
4. Running the algorithm remotely using NoMachine
English C1