Full stack engineer specializing in cybersecurity, backend systems, and vulnerability management
I build secure, scalable solutions from end-to-end. Currently focused on enterprise security infrastructure and cloud deployments.
I'm a graduating Software Engineering student from Western University with a passion for cybersecurity and full-stack development. I completed a co-op position as an IT Analyst in Vulnerability Management at Ontario Health, where I focused on securing enterprise infrastructure and managing vulnerabilities.
My expertise spans across security compliance, vulnerability remediation, network security, and cloud technologies. I've built solutions ranging from secure body-scanning systems to full-stack web applications with complex backend architectures.
I'm constantly learning and pushing the boundaries of what's possible with modern tech stacks, always focused on delivering measurable impact.
Ontario Health • Toronto, ON (Co-op Position)
Telus • Mississauga, ON
Designed and implemented a comprehensive secure 3D body-scanning and measurement extraction system with privacy-aware handling of biometric data. Developed full pipeline for generating personalized 3D models with integrity checks, implemented computer vision algorithms and calibration routines, and built secure workflow to transmit user measurements with safe transfer practices and access control.
Supervised development of an interactive web application with Cheer Group to enhance daily living experiences for children with disabilities, including real-time communication tools and resource sharing features.
Led development of a full-stack web-based card collecting game with MySQL backend and user query functionality, featuring five unique user-centric features and secure authentication.
A full-stack AI health & fitness platform using Next.js, Tailwind CSS, Python, and OpenAI APIs supporting real-time chat, voice interaction, and personalized coaching. Trained ML models (Logistic Regression, SVM) on 300+ FAQs to route users across 10+ chatbot personas with NLP pipelines for keyword extraction and intent detection.
An interactive educational platform that simulates adversarial cybersecurity scenarios through autonomous agents. Features Red Team (offensive) attackers performing network reconnaissance and strategic attacks, and Blue Team (defensive) monitors detecting threats and responding in real-time. Includes 5-host network simulation, live Streamlit dashboard with animated attack visualizations, real-time event logging, and step-by-step scenario replays demonstrating cybersecurity concepts like vulnerability exploitation, threat detection, and incident response.
An interactive educational tool for understanding password security, hashing algorithms, and cryptographic concepts. Generate hashes using MD5, SHA-1, SHA-256, SHA-512, PBKDF2, and bcrypt while comparing salted vs unsalted outputs. Run controlled brute-force and dictionary attacks against test hashes to visualize attack speeds, and explore classic ciphers including Caesar, Vigenère, and a simplified Enigma machine. Built for learning with test data only—no network access or external targets.
Western University • London, ON
Sep 2021 — Apr 2026
Relevant Courses: Information Security, Networking, Computer Networks Applications, Intro to AI, Software Construction, Agile Programming, Parallel Algorithms, Cloud Computing, and Machine Learning
Certifications: BigFix 101, BigFix Relevance, ICS2 Cyber Security, AWS Certified Cloud Practitioner
I'm always interested in hearing about new opportunities and challenging projects.