|
I am a postgraduate Cyber Security student with a strong background in full-stack web development, applied cryptography, and cloud-native systems. I enjoy building secure, practical software that bridges research concepts with usable real-world applications.
|
Cyber Security
Applied Cryptography
Full-Stack Engineering
DevOps & Infrastructure
Currently exploring |
|
A microservice-based authorisation system using token-based access control, embedded permissions, and dynamic encryption selection based on system performance. Key areas:
|
A multilingual portfolio and admin platform built with modern full-stack technologies, including project management, theming, and deployment automation. Key areas:
|
|
Research-focused work exploring fuzzy extractors for biometric recognition and post-quantum security applications. Key areas:
|
Infrastructure-focused work combining secure deployment workflows, containerised services, and automated CI/CD pipelines. Key areas:
|
|
Applied Cryptography
JWTs, ratchets, key exchange, fuzzy extractors |
Access Control
ABAC, token-based permissions, secure sharing |
Cloud Security
Docker, Kubernetes, AWS, service hardening |
Network Security
SSH, VPNs, certificates, authentication protocols |
Secure full-stack systems
I enjoy building systems where the frontend, backend, database, authentication, authorisation, and deployment pipeline all work together securely.
Cryptography-focused projects
I am interested in applied cryptography, especially where theoretical security concepts can be turned into practical software.
Cloud-native and DevOps workflows
I like automating deployment workflows with Docker, GitHub Actions, Nginx, and cloud platforms.

