Empowering Cybersecurity Through Expertise and Innovation

Explore the world of cybersecurity with insights, training, and cutting-edge projects from The Cyberdude.

About Me

Cybersecurity Analyst with 3+ years of experience in SIEM monitoring, threat detection, and incident response. Adept at using tools like Splunk, Wireshark, and Python for automation and forensic analysis. Proven track record of reducing incident response times, strengthening security postures, and supporting ISO 27001 and NIST compliance. Known for strong client-facing skills, hands-on labs, and a proactive approach to cybersecurity

Cybersecurity Projects

Explore innovative projects showcasing cybersecurity expertise and solutions.

A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
Malware Analysis

In-depth analysis of malware threats and mitigation strategies.

A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
Honeypot Deployment

Creating honeypots to detect and analyze cyber threats.

A person wearing a Guy Fawkes mask is positioned near a server rack filled with blue and green cables and illuminated lights. The individual is dressed in a dark-colored suit and is close to the camera.
A person wearing a Guy Fawkes mask is positioned near a server rack filled with blue and green cables and illuminated lights. The individual is dressed in a dark-colored suit and is close to the camera.
Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.
Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.
SIEM Dashboards

Visualizing security events for effective threat management.

Training Courses

Offering comprehensive training in cybersecurity and threat hunting.

Cybersecurity Expertise

As a cybersecurity analyst and threat hunter, I specialize in identifying vulnerabilities and mitigating risks to protect digital assets effectively.

Experience

Professional Work History

I have extensive experience in cybersecurity, focusing on threat analysis and risk management.

A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
Skills and Projects

Experience. With our intuitive design and user-friendly interface, your website will captivate visitors. 2

About The Cyberdude

Your trusted cybersecurity analyst and threat hunter, dedicated to sharing knowledge and expertise in the ever-evolving infosec landscape.

A person is standing by a large window in a modern office with a cityscape view. They are wearing a dark hoodie and looking attentively outside, holding a smartphone. A desk with a computer monitor displaying colorful code is situated in the foreground.
A person is standing by a large window in a modern office with a cityscape view. They are wearing a dark hoodie and looking attentively outside, holding a smartphone. A desk with a computer monitor displaying colorful code is situated in the foreground.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.

Cybersecurity Services Offered

Professional cybersecurity solutions, training, and insights to protect your digital assets effectively.

Expert Cybersecurity Training
A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.

Learn essential skills through free and paid infosec courses tailored for all levels.

A person wearing a red hoodie works on a laptop in a dark room illuminated by blue light. The background features server equipment and logos of various technology companies on a transparent panel.
A person wearing a red hoodie works on a laptop in a dark room illuminated by blue light. The background features server equipment and logos of various technology companies on a transparent panel.
Green digital code streams vertically across the screen, resembling a hacker or cyber interface against a dark background.
Green digital code streams vertically across the screen, resembling a hacker or cyber interface against a dark background.
Comprehensive Threat Analysis

In-depth analysis of threats with case studies to enhance your cybersecurity knowledge and skills.

Showcasing innovative projects like malware labs and SIEM dashboards for practical insights.

Portfolio of Projects