Building intelligent security systems that defend at scale. Specializing in threat detection, SIEM engineering, and AI-powered automation — turning alerts into actionable intelligence.
Open to Threat Analysis, Security Automation, and Threat Intelligence roles. Let's discuss how I can help strengthen your security posture.
A threat actor left an encoded message in a phishing email. Decode the Caesar cipher to uncover the hidden command. Shift value: unknown — you must brute-force it.
Tip: Try each shift 1-25 mentally, or look for common words like THE, AND, IS
Malware embedded a binary-encoded payload in a log file. Each 8-bit group is an ASCII character. Decode the full message before the timer runs out!
Each group of 8 bits = 1 ASCII character. 01000001 = A (65)
You captured a password hash from a compromised endpoint. Crack it using the provided wordlist — identify which common password matches the MD5 hash.
MD5 Hash to crack:
Wordlist (click to test):
MD5 is a one-way hash — you must try each word from the wordlist and see which one matches.
You're analyzing a PCAP dump. Find all suspicious packets — look for C2 beaconing, port scans, exfiltration, or known malicious IPs. Click each suspicious row to flag it.
| # | SRC IP | DST IP | PORT | PROTO | SIZE | FLAG |
|---|
Look for: repeated connections to same IP (beaconing), unusual ports (4444, 1337, 31337), private→public large transfers, known C2 IPs (185.x.x.x ranges)
You are the firewall. Classify each network rule as ALLOW or DENY based on security best practices. Get all rules correct to protect the network!
Click ALLOW ✅ or DENY ❌ for each rule:
Deny: telnet(23), FTP(21), RDP(3389) from internet, any port 0. Allow: HTTPS(443), SSH from trusted IPs, DNS(53) outbound.