🎓 Bachelor of Information Technology | Major: Networks & Security
🔐 Future-focused on Cybersecurity, Systems Analysis, and Cloud Solutions
📍 Based in Australia | 💬 Actively looking for internship or grad roles in Cybersecurity, Systems Analysis, Networks Architecture/ administrator and Technical Consulting
💻 Technology Enthusiast | Cybersecurity Researcher | Aspiring Network 💻 Technology Enthusiast | Cybersecurity Researcher | Network Analyst | Networking Advocate | Network and Security Student | Aspiring Network Engineer | Developing Full-Stack Developer
I am a dedicated and detail-oriented technology student committed to designing secure, scalable, and user-centered digital solutions. With practical experience in penetration testing, Active Directory exploitation, vulnerability assessments, and cloud platforms, I am adept at addressing real-world challenges through a secure-by-design approach.
My expertise includes deploying Dockerized environments, conducting ethical hacking exercises, developing responsive front-end applications, and managing MongoDB-backed Express applications. I engage in each project with analytical thinking, an insatiable curiosity, and a profound dedication to continuous learning.
I thrive in collaborative environments where systems analysis, secure architecture, and innovative problem-solving intersect—particularly when I can effectively bridge the gap between complex technical concepts and intuitive user experiences.
Security Testing | Systems Thinking | Cloud and DevOps | Full-Stack Projects | Data-Driven Design | CCNA-Certified Networking Student
"Driven Information Technology student focused on cybersecurity and networking, honing skills in vulnerability identification and security assessment to strengthen system resilience. With knowledge from CCNA coursework and practical experience with Cisco technologies, this individual excels in network analysis, packet sniffing, and ethical hacking, converting technical insights into actionable strategies for enhancing organizational cybersecurity."
"a growing focus on accessibility and responsive design to create user-centered interfaces. While developing foundational skills in building secure and robust applications, there is a strong commitment to ensuring that every user has an inclusive and seamless experience, regardless of their abilities or devices.."
“Great collaboration is built on the right tools—and the right mindset.”
"Recognized for effective communication, attention to detail, and enthusiastic collaboration in fast-paced environments. Continuously open to learning, adapting, and ethically solving challenges efficiently."
Role: Security Analyst
Conducted an internal network pen test on an Active Directory environment. Used tools likeNmap
,Impacket
,BloodHound
,CrackMapExec
to find and exploit misconfigurations. Reported CVEs with detailed mitigation strategies
✅ Contribute to secure system design and implementation
✅ Apply cloud & DevSecOps principles in production-grade environments
✅ Build a career in cybersecurity, systems analysis, or business IT consulting
“Driven by curiosity. Powered by problem-solving. Focused on secure, scalable tech.”
This README was crafted with care to showcase not just my skills but my passion for tech.