This project demonstrates hands-on experience with data validation, system testing, and risk-aware development in a regulated environment.
Project Overview
Designed and developed a centralized Microsoft Access database to support application testing, data validation, and reporting during an enterprise SAP transition in a regulated banking environment. The solution enabled Accounting teams to import, compare, and reconcile financial data from multiple source systems, improving data accuracy and readiness for parallel testing.
Key Contributions
Technologies Used
Microsoft Access (VBA), SQL, CSV imports, Data Validation & Reconciliation
Project Overview
Conducted hands-on vulnerability assessments in controlled lab environments using industry-standard security tools, including Wireshark, Nmap, and Nessus. Work was performed across St. John’s University lab environments and a personal home lab to strengthen practical cybersecurity skills.
Key Activities
Tools & Technologies
Wireshark, Nmap, Nessus, Linux, Network Traffic Analysis
Project Overview
Designed and developed a custom personal portfolio website to showcase cybersecurity experience, technical projects, certifications, and professional background. Built using HTML, CSS, and JavaScript, the site serves as a centralized platform highlighting hands-on technical work and career progression.
Key Contributions
Technologies Used
HTML, CSS, JavaScript, Front-End Development, UX Design Principles
Project Overview
Configured a dual-boot system on a Windows laptop with Ubuntu Linux to strengthen familiarity with Linux environments and operating system security concepts. The setup enabled isolated environments for testing, development, and security-focused experimentation.
Key Contributions
Technologies Used
Ubuntu Linux, Windows OS, Dual-Boot Configuration, File Systems, Bootloader Management
Project Overview
Performed hands-on digital forensics and data recovery exercises using industry-standard forensic tools to recover hidden and deleted data from storage media. The project focused on maintaining data integrity and supporting investigative workflows in controlled environments.
Key Contributions
Tools & Technologies
FTK Imager, Autopsy, Digital Forensics, Data Recovery, Hashing (MD5, SHA-1)
Project Overview
Developed hands-on Linux system administration skills through practical exercises focused on file management, permissions, networking, and basic automation in controlled environments.
Key Contributions
Technologies Used
Linux, Bash, File Systems, Networking Utilities, Automation Scripts
Project Overview
Completed hands-on cybersecurity labs and guided challenges focused on foundational security concepts and practical tool usage in simulated environments.
Key Activities
Tools & Technologies
Wireshark, Nmap, Burp Suite, Network Security Concepts
Project Overview
Strengthened programming and web development fundamentals through structured, hands-on coursework focused on practical application.
Key Areas
Technologies Used
HTML, CSS, JavaScript, Python
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.