Skills

๐Ÿ” Cybersecurity

Network Security CPS Security Cloud Security AI Security IAM SOC Operations Incident Response SIEM Tools Intrusion Detection (IDS) Threat Intelligence

๐Ÿ›ก๏ธ Vulnerability Assessment & Penetration Testing

Metasploit Nmap Burp Suite Wireshark Nessus OpenVAS Nikto Hydra John the Ripper Aircrack-ng OWASP ZAP K6 Load Testing

๐Ÿ”‘ Cryptography & Privacy

AES / RSA / PKI Homomorphic Encryption Searchable Encryption Identity-Based Encryption (IBE) Zero-Knowledge Proofs Differential Privacy Privacy-Preserving Storage Scyther (Protocol Verification)

โ˜๏ธ Cloud & DevOps

Oracle Cloud (OCI) AWS Azure Terraform Docker Kubernetes CI/CD Pipelines Infrastructure as Code (IaC)

๐Ÿง  Machine Learning & AI

Scikit-learn Random Forest XGBoost SVM Clustering Anomaly Detection Federated Learning Adversarial ML Deep Learning TensorFlow / PyTorch MATLAB Pandas / NumPy Matplotlib / Seaborn

๐Ÿค– LLM & Generative AI

Large Language Models (LLMs) Retrieval-Augmented Generation (RAG) Prompt Engineering Fine-Tuning (LoRA / PEFT) LLM Security & Red Teaming Defensive Architectures for LLMs Vector Databases Hugging Face Transformers

๐Ÿงช Simulation & Verification Tools

NS-3 GridPACK HELICS Node-RED Smart Grid Simulation Scyther MATLAB / Simulink Time Sync Models

๐Ÿ–ฅ๏ธ Programming & Scripting

Python C C++ Java JavaScript Bash / Shell HTML / CSS Markdown

โœ๏ธ Academic & Technical Writing

LaTeX Overleaf TeXstudio Research Paper Writing Technical Documentation Zotero & Mendeley

๐Ÿ—ƒ๏ธ Database & Web

MySQL Oracle DB PostgreSQL RESTful APIs WebSockets

๐Ÿ“‚ Tools & Platforms

Git / GitHub / GitLab Linux (Ubuntu / Oracle Linux) VS Code Jupyter Notebook Google Colab Wireshark VirtualBox / VMware