Freelance Cybersecurity & Software Developer | 2025-JANUARY – Present
NexurityDefensia
Develop and deploy cybersecurity-focused software tools and security
automation solutions. Work on threat detection systems, phishing
analysis tools, and secure application development.
- Develop cybersecurity tools for threat monitoring and analysis
- Build AI-based phishing detection systems
- Design secure desktop and web applications
- Implement automation scripts for security tasks
- Research attack techniques and defensive countermeasures
Key Skills Gained
- Secure Software Development
- Threat Detection System Design
- Cybersecurity Automation
- Security Tool Development
- Phishing Detection Techniques
Remote Cybersecurity Intern | 2025-JUNE – 2025-AUGUST
Mossé Cyber Security Institute
Completed hands-on cybersecurity training focused on penetration testing,
threat detection, and vulnerability assessment through practical lab
exercises and attack simulations.
- Performed vulnerability assessments using OpenVAS
- Conducted network reconnaissance using Nmap
- Tested exploitation techniques with Metasploit
- Analyzed credential attacks using Mimikatz
- Studied real-world attack techniques and defense methods
Key Skills Gained
- Vulnerability Assessment
- Network Scanning & Reconnaissance
- Penetration Testing Fundamentals
- Credential Attack Analysis
- Cyber Threat Investigation
Full Stack Developer Intern | 2025-MAY – 2025-JUNE
PACE Computer Education
Worked on developing and maintaining dynamic web applications,
improving application performance and debugging backend systems.
- Developed responsive web applications
- Debugged backend and frontend code
- Improved website performance
- Assisted in database integration
Key Skills Gained
- Full Stack Web Development
- Frontend Development (HTML, CSS, JavaScript)
- Backend Debugging
- Database Integration
- Application Performance Optimization
Security Research & Practice | 2025-JANUARY – 2025-PRESENT
- Practicing penetration testing labs and controlled attack simulations
- Studying real-world cyber attack techniques and defense strategies
- Researching phishing detection and intrusion prevention mechanisms
- Developing defensive cybersecurity tools and automation scripts
Key Skills Gained
- Security Operations Center (SOC) Monitoring Concepts
- Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)
- Security Event Analysis and Threat Detection
- Network Traffic Monitoring and Packet Inspection
- Indicator of Compromise (IOC) Identification
- Phishing Attack Analysis
- Cyber Threat Intelligence Research
- Incident Investigation and Security Alert Analysis