Featured Projects

Here are some of the security-focused projects I've developed to demonstrate practical cybersecurity skills and backend development expertise.

🐶Dog Activity recomender!

Tech Stack: Python, Pillow, Tkinter

Duration: 3 weeks | Status: Completed

Dog Activity Recommender is a program that suggests fun activities for your dog based on answers to a few questions about your dog’s energy level, size, and preferences. It helps dog owners find the best games and exercises to keep their pets happy and healthy.

Key Features:

  • 💡 Smart Backend Logic
    Evaluates your dog’s profile to suggest personalized activities.

  • 🐾 Tailored Questions
    Based on your dog’s energy level, size, temperament, and preferences.

  • 🎯 Personalized Recommendations
    Designed to promote your pet’s health, happiness, and well-being.

  • 🖥️ User-Friendly Interface (Tkinter)
    Intuitive GUI built with Tkinter for a smooth user experience.

  • 🌄 Image Support
    Integrated with the Pillow library to display and handle images.

  • Weather Integration
    Recommends activities suitable for current weather conditions.

  • 🌗 Light & Dark Theme Toggle
    Switch themes for comfort and aesthetics.

  • 🖱️ Hover Effects
    Enhanced button interactivity for better usability.

  • 📋 Copy to Clipboard
    Instantly copy your dog’s recommended activities. dog
  • 📄 Export to .TXT File
    Save activity results to a text file for easy reference.

🚀 Future Plans

  • 🤖 AI-Powered Recommendations
    In future releases, we plan to integrate AI features that will make the activity suggestions smarter and virtually infinite — dynamically adapting to your dog’s evolving needs, preferences, and behavior patterns.

👉 Try the Dog Activity Recommender!
(Runs in Python — copy the code or clone the repo to test it locally.)


🚨 Divide & Defend: A Hands-On SOC Lab Project with Micro-Segmentation

Tech Stack: Python, Wazuh, MISP, Docker

Duration: 3 months | Status: In Development

This project simulates the core responsibilities of a SOC Analyst by building a functional lab environment using virtual machines and open-source tools. It emphasizes practical skills in threat detection, alert triage, and incident response. A key focus is the use of micro-segmentation as a proactive defense strategy to enhance network security.

Key Components:

  • 🖥 Virtual SOC Lab Deployment: Multi-VM setup simulating attacker, victim, and SIEM systems
  • 🛡 Micro-Segmentation Implementation: Firewall rules to block unauthorized lateral movement
  • 📡 SIEM Configuration & Alerting: Wazuh/ELK/Splunk for log ingestion, detection rules, and alerts
  • 🚨 Incident Triage & Reporting: Investigation of alerts, false positive reduction, and documentation

Impact:

  • 📉 Reduced false positive rate by 40% through tuning Wazuh detection rules and filtering noise from simulated attack logs
  • ⏱ Decreased mean time to detection (MTTD) by 25% by streamlining alert triage in the SOC lab environment
  • 📋 Standardized incident response across the project using documented playbooks and consistent reporting procedures

Want to Learn More?

These projects represent my commitment to practical cybersecurity implementation. Each project includes detailed documentation, security considerations, and lessons learned.

Get in Touch