You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/routes/work.json
+34-13Lines changed: 34 additions & 13 deletions
Original file line number
Diff line number
Diff line change
@@ -108,6 +108,15 @@
108
108
"▼ Created a generic data ingestion deployment in Kubernetes to collect security feeds and logs using rsyslog and Fluentbit. Since Fluentbit's syslog module doesn't support TLS encryption, rsyslog was used to ingest the streams, and Fluentbit was responsible for uploading batched stream data to Minio S3 buckets, denormalized based on features like application, region, and IP address.",
109
109
"▼ Due to the absence of a Helm chart for Kubeflow, the team used Argo Workflows DAGs to manage machine learning (ML) pipeline steps for processing security data."
110
110
]
111
+
},
112
+
{
113
+
"Internship Program Leadership & Phishing Detection": [
114
+
"▼ Led two internship programs with college students, teaching fundamental skills in software development, machine learning, and product development.",
115
+
"▼ Guided interns in creating a homegrown solution to detect phishing sites using the UCI phishing website dataset to train machine learning models.",
116
+
"▼ Exposed the trained models via a REST API endpoint, allowing easy integration with other applications and services.",
117
+
"▼ Developed a Microsoft Outlook add-in that enabled users to validate if an email contained a phishing site, providing a practical application of machine learning and security concepts.",
118
+
"▼ Mentored interns in full-stack development, data science, and security practices, fostering hands-on learning and real-world problem-solving."
"summary": "Automated the manual review of enterprise application logs for PCI compliance by developing an extensible ML pipeline in Kubeflow and a web application for scheduling log reviews and validating model predictions. This solution significantly reduced manual effort and improved efficiency by enabling automated anomaly detection for PCI compliance.",
177
+
"summary": "Automated the manual review of enterprise application logs for PCI compliance by developing an extensible ML pipeline in Kubeflow and a web application for scheduling log reviews and validating model predictions. This solution significantly reduced manual effort and improved efficiency by enabling automated anomaly detection for PCI compliance. Was a member of the security architecture review panel ensure alignment of projects with the company’s overall security objectives and standards.",
169
178
"overview": {
170
-
"summary": "Automated the manual review of enterprise application logs for PCI compliance by developing an extensible ML pipeline in Kubeflow and a web application for scheduling log reviews and validating model predictions. This solution significantly reduced manual effort and improved efficiency by enabling automated anomaly detection for PCI compliance.",
179
+
"summary": "Automated the manual review of enterprise application logs for PCI compliance by developing an extensible ML pipeline in Kubeflow and a web application for scheduling log reviews and validating model predictions. This solution significantly reduced manual effort and improved efficiency by enabling automated anomaly detection for PCI compliance. Was a member of the security architecture review panel ensuring alignment of projects with the company’s overall security objectives and standards.",
171
180
"contributions": {
172
-
"✅ Automated Log Review Process": [
173
-
"▼ Developed a generic ML pipeline to automate the review of application logs for PCI compliance, replacing the manual process for log owners."
181
+
"✅ Software Development": [
182
+
"▼ Developed a web app that allows app owners to schedule log reviews and easily validate detected anomalies.",
183
+
"▼ Built the web app using Angular, TypeScript, Bootstrap 4, and SCSS, with a responsive design based on the ngx-admin template. Unit tests were written using Jasmine and Karma.",
184
+
"▼ Integrated Google's OAuth 2.0 with OIDC for Single Sign-On (SSO). The web app included an authentication module that dynamically displayed user options based on roles (e.g., admin, reviewer). The app server validated the user's OIDC token and provided a JWT token for future authentication and authorization (Authn/z).",
185
+
"▼ Utilized OpenAPI Generator with an OpenAPI 3.0 specification file to automatically generate a Flask CORS Python server. This automated the creation of controllers based on routes. The code was structured according to the Open/Closed principle: open for extension but closed for modification.",
186
+
"▼ Used MySQL for app data storage and MongoDB to store detected anomalies."
174
187
],
175
-
"✅ End-to-End ML Pipeline": [
176
-
"▼ Built extract, clean, transform, train, and predict scripts using Scikit-Learn, Pandas, and Numpy."
188
+
"✅ Data Science": [
189
+
"▼ Built generic extract, clean, transform, train, and predict scripts using Scikit-Learn, Pandas, and NumPy, designed for use with several application logs.",
190
+
"▼ Containerized steps to use in Kubeflow pipelines.",
191
+
"▼ Developed two Kubeflow pipelines—one for training models and one for prediction.",
192
+
"▼ Ran nightly prediction pipeline batch jobs on app logs, tracking anomalous logs for app owner review to adhere to PCI requirements.",
193
+
"▼ Trained an unsupervised K-Means algorithm on log data, using the Silhouette Score to measure clustering results. Filtered out noise by reducing high-dimensional data into a lower-dimensional space using Principal Component Analysis (PCA)."
177
194
],
178
-
"✅ Anomaly Detection": [
179
-
"▼ Trained an unsupervised K-Means algorithm on log data to predict anomalous log entries, flagging any new samples that were 2 standard deviations away from their cluster centroid."
195
+
"✅ SRE": [
196
+
"▼ Deployed Kubeflow, MySQL, MongoDB, and the web application to Google Kubernetes Engine (GKE).",
197
+
"▼ Managed MySQL, MongoDB, and the web app via Helm."
180
198
],
181
-
"✅ Web Application Integration": [
182
-
"▼ Developed a web interface enabling app owners to schedule log reviews and easily validate the model's predictions."
199
+
"✅ Security": [
200
+
"▼ Was a member of the security architecture review panel, providing subject matter expertise (SME) to ensure alignment of projects with the company’s overall security objectives and standards.",
201
+
"▼ Conducted comprehensive reviews of proposed designs and solutions, identifying potential security risks and recommending mitigations, with a focus on ensuring compliance with NIST 800-53 and ISO 27001 frameworks.",
202
+
"▼ Collaborated with cross-functional teams to assess the security posture of system designs, ensuring adherence to company security standards, including encryption requirements, access controls, and network security.",
203
+
"▼ Reviewed data flow diagrams and system integrations to evaluate potential vulnerabilities, ensuring proper handling of sensitive data and compliance with privacy regulations (e.g., PCI, GDPR)."
183
204
]
184
205
},
185
-
"skills": "Kubernetes · Kubeflow · Scikit-Learn · NumPy · Pandas (Software) · Web Development · Angular Material · OIDC · MongoDB"
206
+
"skills": "Kubernetes · Kubeflow · Scikit-Learn · NumPy · Pandas · Web Development · Angular Material · OIDC · MongoDB · NIST 800-53 · ISO 27001"
186
207
}
187
208
},
188
209
{
@@ -208,7 +229,7 @@
208
229
"▼ Led a joint project with McAfee to classify the severity of SIEM alerts using machine learning, automating alert reporting and prioritizing alerts for SOC analysts."
209
230
]
210
231
},
211
-
"skills": "Java · JavaScript · Angular Material · HTML · Bootstrap (Framework) · JUnit · Unit Testing · Python · Scikit-Learn · NumPy · Pandas (Software) · Machine Learning"
232
+
"skills": "Java · JavaScript · Angular Material · HTML · Bootstrap · JUnit · Unit Testing · Python · Scikit-Learn · NumPy · Pandas · Machine Learning"
0 commit comments