Certifications

Professional certifications that validate my expertise in cybersecurity and ethical hacking.

Google CyberSecurity Certified Professional (GCSP)

Google CyberSecurity Certified Professional (GCSP)

Google2023

Those who earn the Google Cybersecurity Certificate have completed eight courses, developed by Google, that include hands-on, practice-based assessments and are designed to prepare them for entry-level roles in cybersecurity.

Network SecuritySIEM toolsLinuxCloud ComputingIntrusion Detection Systems (IDS)Python ProgrammingSQL
Cybertalents Certified SOC Analyst (CCSOCA)

Cybertalents Certified SOC Analyst (CCSOCA)

Cybertalents2025

The certification validates my ability to understand and operate within a SOC environment, including real-time threat monitoring, incident response, and cyberattack mitigation.

Security Information and Event ManagementSplunkDigital ForensicsIncident ResponseWeb Security AnalysisEndpoint SecurityNetwork Security
CyberTalents Certified Threat Hunter (CCTH)

CyberTalents Certified Threat Hunter (CCTH)

Cybertalents2025

As a Certified Threat Hunter, I have acquired advanced threat detection and response capabilities, specializing in proactively identifying and analyzing cyber threats and ongoing intrusions.

Cyber Threat Hunting (CTH)IoCs, YARA, and Sigma RulesSTIX/TAXII and KestrelHunting with WiresharkPowershell Hunting Tools
CyberTalents Certified OSINT Analyst

CyberTalents Certified OSINT Analyst

Cybertalents2025

This certification validates my ability to conduct intelligence-driven operations that support both offensive and defensive cybersecurity strategies.

OSD, OSIF, and OSINTWebsite AnalysisSOCMINTIMINT
Introduction to Cybersecurity Bootcamp (ICS)

Introduction to Cybersecurity Bootcamp (ICS)

Cybertalents2024

This certification from CyberTalents validates my skills in cybersecurity, including Traffic Analysis, OWASP, Steganography, Burp Suite, and web security. The bootcamp provided hands-on experience in analyzing network traffic, identifying web vulnerabilities, and using advanced tools to enhance security measures.

Traffic AnalysisOWASPSteganographyBurp Suiteweb security
Introduction to Cyber Attacks

Introduction to Cyber Attacks

New York University2024

Successfully completed a foundational course focused on cybersecurity threats, system vulnerabilities, and risk assessment methodologies. This certification demonstrates a solid understanding of how modern cyberattacks are constructed, executed, and mitigated within real-world systems.

Risk AssessmentSecurity EngineeringDenial-Of-Service Attack (DOS)Information Security (INFOSEC)Cyberattacks
Real-Time Cyber Threat Detection and Mitigation

Real-Time Cyber Threat Detection and Mitigation

New York University2024

Successfully completed a course focused on real-time cybersecurity strategies within the context of TCP/IP protocol suites and enterprise network environments.

Risk AssessmentSecurity EngineeringInformation Security (INFOSEC)Cyberattacks