Technical Work

Architecture, systems, and tools built for real operational use — from a containerized SOC to a national-scale sovereign security platform.

Flagship Project
Active Development

Project Synapse

A multi-phase sovereign security engineering program — from a basic detection engine to a national-scale architecture with six specialized capability domains. Built entirely from first principles.

8
Phases
6
Domains
10k+
Events/Day
~2s
Detect Latency
Synapse Mini — Containerized Architecture Stack
Data Sources
Ubuntu Agents Windows Hosts Kali VMs Network Logs
↓ Wazuh Agent Collection ↓
Ingestion
Wazuh Manager Kafka: raw-logs Kafka: parsed-logs
↓ Stream Processing ↓
Analysis
Spark Streaming ML Anomaly Engine Kafka: ml-alerts
↓ Storage & Visualization ↓
Intelligence
OpenSearch Dashboards MITRE Correlation
↓ Response Orchestration ↓
Response
TheHive Cases Cortex Analyzers Automated Playbooks Analyst Handoff
Evolution

All Eight Phases

Defense
Offensive
Sovereign
Integration
Phase 0
Basic — The Origin
Prototype / Concept

The initial log-correlation prototype. A simple Python script that asked: "what if we automated threat correlation?" Proved the concept was worth engineering.

Phase 2
Synapse Mini
Containerized SOC — POC

Compressed Enterprise into a full Docker Compose stack. Wazuh, Kafka, Zookeeper, Spark, OpenSearch, TheHive, and Cortex — all running together. Processes 10,000+ events/day with ~2–3s detection latency. Full BC/DR documentation included.

Phase 3
Synapse Vector
Adversarial Simulation

The pivot from defense to offense. Vector models attacker TTPs using MITRE ATT&CK, enabling automated red-team scenarios and direct integration with the detection pipeline to validate coverage.

Phase 4
Synapse Umbra
Stealth Operations Layer

Operational stealth for offensive simulation — deception, obfuscation, covert channel design. Umbra makes attack operations invisible to detection systems not specifically built to handle it.

Phase 5
Synapse Axiom
Intelligence & Integration Core

The evolved intelligence core — rebuilt and upgraded to seamlessly integrate all six sovereign arms. Handles policy enforcement, correlation logic, and central decision routing across the entire platform.

Phase 6
Synapse Holmes
Forensics Laboratory

The investigation lab — dedicated to deep forensic analysis, artifact reconstruction, timeline correlation, and chain-of-custody documentation. Small footprint, high mission-criticality.

Other Work

Technical Projects

Cloud Security

Cloud-Based Security Architecture (AWS)

Multi-layer AWS security solution integrating WAF, GuardDuty, IAM baselines, centralized logging, and Security Hub. Reduced client incident exposure by approximately 30%.

AWSGuardDutyWAFCloudTrailIAM
SIEM Engineering

SIEM Implementation for SME

Built and deployed an ELK-based SIEM for centralized log management. Integrated custom ML classification models for alert scoring. Improved detection accuracy and compliance reporting readiness.

ELKML ClassifiersOpenSearchCustom Dashboards
Endpoint Security

Endpoint Protection Deployment

Configured XDR/EDR solutions across 20+ endpoints, enabling automated patching pipelines, device-level threat monitoring, and DLP policy enforcement.

XDR/EDRDLPNACAutomated Patching
Penetration Testing

Active Directory Penetration (MASAR)

Full AD exploitation simulation in a Windows Server 2019 environment. Executed ZeroLogon, PrintNightmare, SMB/RDP exploitation, and privilege escalation. Produced governance-aligned risk report mapping all findings to ISO control categories.

ZeroLogonMimikatzPowerViewPrintNightmare
Network Security

Network Design & PNetLab Simulation

Built full enterprise network topology with routers, switches, firewalls, and servers. Hosted a secure web server on Kali Linux and validated network segmentation policy enforcement end-to-end.

PNetLabRouting & SwitchingFortinetSegmentation
Open Source

security-tools Repository

Lightweight CLI utilities for SOC triage operations — starting with a working IOC extractor that pulls public IPs, domains, and hashes from alert text with deduplication and private-IP filtering.

PythonIOC ExtractionCLIOpen Source
On Work Visibility

Not Everything is Public

Client-specific deliverables and operational security constraints limit what can be published openly. What's listed here represents architecture patterns and system designs — not specific client data. For depth, the best path is a direct conversation.

Start a Conversation →