Work
Projects and experiments — from product engineering to research. Each one represents a real problem I identified and solved.
Featured Work
Two projects that represent my best work — one in product engineering, one in research.
Problem
Pentest outputs lack structure — events are disconnected, making it hard to trace how an attack actually progressed and where it led.
What was built
An attack chain intelligence platform that transforms flat pentest output into structured, interactive, MITRE-mapped attack chain views.
Key outcomes
- ●Combines AI-driven interpretation with deterministic flow and validation logic
- ●Reconstructs attack sequence, context, and privilege evolution across events
- ●Bridges fragmented outputs into a unified, dependency-aware attack understanding
- ●Flags inconsistencies, invalid transitions, and incomplete attack paths
- ●Designed as a scalable system for real-time ingestion and analysis
Problem
AI-generated voices make it increasingly difficult to trust voice-based interactions, enabling high-impact vishing and impersonation attacks.
What was built
A real-time voice analysis system designed to identify synthetic and manipulated speech in live and recorded scenarios.
Key outcomes
- ●Converts audio signals into frequency-domain representations for pattern analysis
- ●Trained ML models (CNN/LSTM) on extracted audio features to distinguish real vs synthetic speech
- ●Evaluates temporal and spectral characteristics to detect inconsistencies in generated voices
- ●Research-backed system with focus on practical detection of voice-based attacks
All Projects
A selection of projects and experiments
- ●Four-node lab: SIEM server, monitored endpoint, analyst workstation, attacker machine
- ●Mini-project roadmap: Setup → Log Baseline → Detection Rules → Attack Simulation → IR
- ●L1–L3 workflow: triage, deep investigation (KQL), and post-incident detection tuning
- ●Reconstructs full attack timeline with MITRE mapping, IOC enrichment, and evidence-driven analysis
- ●Detection rules, investigation reports, SOC runbooks, architecture docs
- ●Full pipeline: Endpoint → MDE → Log Analytics → Sentinel → Alert → Incident → ServiceNow
- ●Secure web hosting, Tally remote access, tunnel-restricted RDP, encrypted FTPS
- ●Each with full documentation and demo videos
- ●Queries multiple platforms, filters by security keywords, extracts experience via regex
- ●Stage 1 of a three-stage candidate automation stack