This website is a repository for my cybersecurity projects and a place to share ideas on InfoSec, technology and cloud computing.
I have a background in digital design and 3D visualisation. I have also run my own business for a few years. I love working with businesses and contribute to their success. With cloud computing and data privacy being paramount to business and everyday life, I want to help companies and people keep their data safe and their systems resilient to threats.
I’m a certified Azure Security Engineer and keep learning about information security, governance, risk and compliance. Below, a growing list of knowledge and experience accrued.
I also have a mentor in cyber governance which is helping me solidify and develop in this area: so grateful for it!
CERTS:
- Microsoft Cybersecurity Analyst Professional
- MS AZ-500: Microsoft Azure Security Engineer Associate
- The GRC approach to managing cybersecurity – Kennesaw state uni
PERSONAL PROJECTS AND LABS
- Try Hack Me labs, Advent of Cyber 2025
- Setup and configured Pfsense firewall
- Network segmentation on Unifi router and access point
- Built and configured Network Attached Storage (TrueNAS)
- Reviewing cybersecurity news daily/weekly and analysing threat actor’s tactics and techniques used, as well as best controls for each vulnerability. Sources include: Simply Cyber Daily threat brief, CISO series, Click Here podcast, Darknet Diaries)
- Microsoft Cybersecurity Analyst Professional: Network segmentation project + Capstone project
COURSES
- Comptia A+
- DR. CHUCK, Python for everyone
- Hands-on Python for networking professionals, ITPro.TV
- Reading: “Mastering Information Security Compliance Management” – ISO 2001:2022
- The Definitive GRC Analyst Master Class – Simply Cyber
- Prepared, executed, and reported on audit of subset of NIST SP 800-53 cybersecurity controls
to include interview, document review, and testing of systems to support compliance audit
activities. - Knowledgeable on NIST Cybersecurity Framework and how the Identify, Protect, Detect,
Respond, and Recover categories comprise and facilitate an information security program - Semi-quantitatively analysed cybersecurity risk using NIST SP 800-30 methodology to identify
highest risk weaknesses for a system - Executed threat modeling exercise to determine higher likelihood threat events to inform
cybersecurity risk modeling
- Prepared, executed, and reported on audit of subset of NIST SP 800-53 cybersecurity controls