SOC Analyst & Security Engineer | AI Security Research
SOC Analyst & Security Engineer | AI Security Research
SOC Analyst and Security Engineer with proven experience in defensive security operations, research-driven threat analysis, and applied incident response. I combine a strong technical foundation with a proactive mindset to detect, analyse, and respond to security events.
Deeply passionate about AI Security Research, I am focused on understanding and mitigating the emerging threats that AI systems introduce, delivering reliable protection across systems and infrastructure.
My goal is to bridge security operations, engineering, and AI security research to build resilient systems that protect organisations against both today’s threats and tomorrow’s emerging challenges.
Focused on supporting security operations, analysis, and defensive cybersecurity practices
I actively monitor and analyse security alerts, logs, and events to identify threats and suspicious behaviour. This includes applying SOC workflows, supporting accurate escalation, and maintaining clear documentation to ensure effective detection and response across security operations.
identify and assess security risks by applying cybersecurity principles, threat intelligence, and risk-based thinking. This includes researching vulnerabilities, analysing attack techniques, and developing defensive strategies to reduce exposure and support informed security decision-making.
I support incident response by conducting structured investigations, gathering evidence, and applying defined response processes. This includes maintaining information integrity, documenting findings accurately, and contributing to effective containment and resolution of security events.
I actively engage in cybersecurity and AI Security research to stay ahead of emerging threats, tools, and defensive techniques. This includes hands-on labs, independent research into AI-driven attack surfaces, and continuous skill development aligned with SOC and Security Engineering roles.
Exploring the intersection of artificial intelligence and cybersecurity — focusing on emerging threats, adversarial techniques, and defensive strategies.
Analysis of prompt injection vectors targeting LLM-based applications, including direct, indirect, and multi-step attack chains mapped to MITRE ATLAS tactics.
Examining adversarial example generation and training-time poisoning attacks against machine learning models used in security tooling and detection systems.
A practical open-source toolkit for probing LLM-based applications for injection flaws, jailbreak vectors, data leakage, and common security misconfigurations.
Research published on GitHub and external platforms as completed — updated as new analysis is produced.
Core Security Principles
The foundational model that guides every defensive decision. Confidentiality, Integrity, and Availability define how I assess risk, respond to incidents, and architect secure systems — every threat on this globe challenges one or more of these principles.
Ensuring sensitive data reaches only authorised parties. Enforced through encryption, access controls, and least-privilege policies to prevent unauthorised disclosure.
Guaranteeing data remains accurate and unaltered. Maintained through hashing, digital signatures, checksums, and rigorous audit trails that detect tampering.
Keeping systems accessible when needed. Achieved through redundancy, failover, DDoS mitigation, and continuous uptime monitoring to prevent service disruption.
Technical capabilities developed through academic study, research, and hands-on lab practice
Security & Monitoring
ELK Stack (Elastic/Kibana) Splunk SIEM Concepts SIGMA Rules YARA MITRE ATT&CK Log Analysis Alert TriageNetwork Analysis
Wireshark Nmap tcpdump Zeek (Bro) TCP/IP Packet Analysis Network Forensics VLANs / RoutingScripting & Automation
Python Bash / Shell PowerShell Git & GitHub Regex JSON / YAMLFrameworks & Standards
NIST CSF ISO 27001 Awareness Incident Response Risk Analysis Vulnerability Management Detection-as-CodeOperating Systems & Platforms
Kali Linux Ubuntu / Debian Windows Server Active Directory (Basics) VirtualBox / VMwareThreat Intelligence & OSINT
VirusTotal Shodan OSINT Techniques IOC Analysis Threat Feeds AlienVault OTX MISP (Awareness) URL / IP / Hash AnalysisAcademic background, professional experience & continuous development
Actively preparing for industry-recognised certifications and developing hands-on skills through labs, research, and practical exercises aligned with SOC and analyst roles.
London, UK
Sep 2020 - Jul 2024Focused on core cybersecurity principles including network security, risk management, cryptography, secure systems, and security analysis, with practical labs and academic research.
Chartered Management Institute, London, UK
May 2014 - Jul 2014Professional qualification focused on first-line management principles, communication, and organisational awareness, supporting effective teamwork and structured working environments.
Independent Security Project
Dec 2025 - Mar 2026Built a Flask-based encrypted file-sharing system enforcing a verify-then-decrypt model to eliminate decryption oracle risks. Implemented AES-256-GCM, RSA-OAEP/RSA-PSS, and ECDH P-256 + HKDF for Perfect Forward Secrecy, validated by 83 unit tests covering tamper detection, key misuse, and signature forgery.
UWL - London, UK
Jun 2025 - Dec 2025Supported cybersecurity research activities, security analysis, and structured investigation tasks. Gained hands-on exposure to defensive security concepts, threat awareness, and analytical methodologies.
Final Year Project - University of West London
Sep 2023 - Jun 2024Built a machine learning-based anomaly detection system for IoT network traffic as the BSc final year project. Applied Python and scikit-learn to classify malicious patterns in captured traffic, with results visualised through Splunk and Kibana dashboards aligned with SOC monitoring workflows.
Gráfica Rio LTDA - Linhares, Brazil
Mar 2015 - Oct 2019Managed internal network infrastructure and workstations across Windows and macOS, serving as the sole IT point of contact to resolve hardware, software, and production system issues while standardising configurations and documentation to improve reliability.
Headmasters Ltd - London, UK
Nov 2010 - Sep 2014Managed a team of 18 and improved operational efficiency by 35% through workflow redesign and structured coaching. Delivered health and safety training and maintained zero compliance infractions over a three-year period.
Network+
CompTIA
In progressSecurity+
CompTIA
In progressAZ-900 Azure Fundamentals
Microsoft
In progressSplunk Core Certified User
Splunk
In progressHands-on work spanning monitoring, analysis, cryptography, and offensive security
Network Setup & Configuration
Network Security
Anomaly Detection
RSA Cryptography
Packet Analysis
Vulnerability Assessment
London, United Kingdom