Portfolio

This page mirrors the project and capability focus of the main portfolio site, but in a format that works better for long-form reference and blog readers.

Selected Projects

Cybersecurity Home Lab Environment

Built a comprehensive home lab for pentesting and security research, featuring isolated VMs, vulnerable applications, and hands-on exploitation scenarios. Includes network segmentation, intrusion detection, and security monitoring.

Tech stack: VirtualBox, Kali Linux, Metasploit, Burp Suite, OWASP, network security, penetration testing, system hardening

Reverse Engineering & Malware Analysis

Analyzed and reverse engineered malware samples and binaries using static and dynamic analysis techniques. Developed skills in disassembly, debugging, and threat assessment in isolated environments.

Tech stack: IDA Pro, Ghidra, OllyDbg, Wireshark, malware analysis, binary disassembly, threat assessment, reverse engineering

AI-Powered Security Threat Detection

Developed machine learning models for anomaly detection and threat identification in network traffic. Integrated with security tools to automate threat response and improve incident detection rates.

Tech stack: Python, TensorFlow, Scikit-learn, Pandas, network analysis, machine learning, anomaly detection, SIEM integration

Deep Learning Image Classification for Security

Built convolutional neural networks for automated security camera analysis and intrusion detection using computer vision. Trained on custom datasets for real-time threat identification.

Tech stack: Python, TensorFlow, Keras, OpenCV, deep learning, computer vision, CNN, neural networks

Custom Cryptography & Encryption Tools

Implemented custom encryption algorithms and cryptographic tools for secure communication and data protection. Explored both classical and modern cryptography techniques.

Tech stack: Python, cryptography, AES, RSA, hashing, digital signatures, key management, security protocols

Docker and Kubernetes Application Deployment

Managed and deployed applications using Docker and Kubernetes, showcasing strong skills in system administration and security.

Tech stack: Docker, Kubernetes, system administration, security

Python Script Automation

Developed scripts in Python for automating tasks and enhancing operational efficiency in a self-hosted environment.

Tech stack: Python, automation, scripting, operational efficiency

Palo Alto Networks Network Security

Implemented Palo Alto Networks solutions to design a secure network architecture, demonstrating practical understanding of network security.

Tech stack: Palo Alto Networks, network security, architecture design, practical implementation

Skills & Technologies

Security and Operations

  • Firewall and network security
  • Security operations and incident response
  • Security policies and compliance
  • Network and system hardening
  • Threat analysis and threat detection
  • Penetration testing

Cloud and Infrastructure

  • AWS
  • Azure
  • OCI (Oracle Cloud Infrastructure)
  • Kubernetes
  • Docker
  • Terraform
  • Ansible

Programming

  • Python
  • Go
  • Rust
  • Nim

Platforms and Systems

  • Linux
  • Windows
  • Virtualization and cloud services
  • Log management and security analysis

Certifications Snapshot

Selected certifications from the main portfolio include:

  • CompTIA Security+
  • OCI Security Professional
  • OCI 2024 Generative AI Certified Professional
  • Junior Cybersecurity Analyst Career Path
  • Cyber Threat Management
  • Network Defense
  • Python for Data Science
  • Foundational C# with Microsoft

Current Direction

My current work and interests are centered around:

  • Cloud security architecture
  • Security automation and operations
  • Infrastructure reliability
  • AI
  • Machine learning
  • Automation
  • Threat detection

For the full up-to-date portfolio experience, visit the main site at nemanjadjurcic.com.