Junior Cybersecurity Professional — Blue Team · GRC · Infrastructure Security
Porto, Portugal · Available June 2026
Cybersecurity professional completing a Network & Cybersecurity Administration program at CESAE Digital, with internship experience at Petrotec Group in enterprise security — ISO 27001 risk assessment, PAM solution evaluation, and infrastructure documentation.
I build things to learn. My labs cover SIEM deployment, YARA-based malware detection, network intrusion detection with Suricata, and full kill-chain APT emulations mapped to MITRE ATT&CK. Background in software development (Python, C#, .NET, React) helps me understand threats at the application layer.
Currently exploring agentic AI workflows and automation — building better tools to solve security problems faster.
| Project | Description | Key Result |
|---|---|---|
| siem-lab-project | Wazuh SIEM with YARA malware detection, FIM and Active Response | 100% detection rate · <15s response time |
| suricata-ids-integration | Suricata NIDS integrated with Wazuh — network + host detection | 3,539 alerts on NMAP scan · auto IP blocking <5s |
| WAZUH_YARA_Complete_Configuration | Production-ready Wazuh config templates, YARA rules and troubleshooting guides | 15+ custom detection rules |
| threat-detection-blue-team | Centralized index of Blue Team projects with MITRE ATT&CK mapping | 11 tactics covered |
| Project | Description | Techniques |
|---|---|---|
| Offensive_Cybersecurity | APT29 full kill-chain simulation + APT28 spearphishing emulation | T1566 · T1071 · T1003 · T1021 · T1041 and more |
| Project | Description |
|---|---|
| Networking | TCP/IP configurations, subnetting, VLSM and network infrastructure labs |
| google-cybersecurity-course-portfolio | Security audits, NIST CSF, Linux, SQL, network analysis and incident response |
Techniques actively practised across lab projects:
T1566 Phishing · T1071 C2 over HTTP · T1003 Credential Dumping · T1021 Lateral Movement
T1110 Brute Force · T1190 Exploit Public App · T1204 Malicious File · T1595 Active Scanning
T1499 Endpoint DoS · T1070 Indicator Removal · T1547 Boot Persistence · T1041 Exfiltration
Detection & Response Wazuh · Suricata · YARA · ELK Stack · Active Response
Threat Intelligence MITRE ATT&CK · Sliver C2 · Mimikatz · Metasploit · Gophish
Infrastructure Proxmox · VMware · Linux · Windows Server · Active Directory · Docker
GRC & Compliance ISO 27001 · Risk Assessment · GDPR · NIST
Scripting & Dev Python · Bash · PowerShell · C# · .NET · JavaScript · Typescript · Git
Cloud Azure · AWS (fundamentals)
- ISC2 CC — Certified in Cybersecurity (in progress)
- Google Cybersecurity Specialization — 2025
- Google IT Support Certificate — 2023
- Anthropic AI Fundamentals & Claude Code — 2025
All offensive security work was conducted in fully isolated lab environments. No real systems or networks were involved.


