Welcome,

I don't think we've met yet.

I'm Vlad

Portfolio
img

About me

Information Technology + Cybersecurity

As a young child, I have always been intrigued by technology. I would always tinker around playing with components and trying to figure out how things worked. As I grew throughout the years, I followed those interests, expanding my ever-growing education. With that, let me show you what I can do.

Download Resume

Work Experience

Network Security Engineer

HCLTech

Deployed and configured Cisco routers and switches in high-volume production environments, including implementation of advanced security protocols such as firewalls, VPNs, and IDS/IPS’s to ensure secure network operations. Contributed to the design, implementation, and maintenance of network infrastructure and security measures such as VLANs, QoS, and access control to ensure optimal network performance and security.

img

Desktop Support Engineer

HCLTech

Provided crucial technical support to ensure uninterrupted IT operations for my organization. My expertise includes diagnosing and resolving hardware and software issues, configuring workstations, and delivering exceptional customer service. I contribute to the efficiency of the workplace by resolving IT challenges and maintaining a seamless user experience.

img

Cybersecurity Teaching Assistant

CWU-Freelance

Developed and delivered comprehensive cybersecurity curriculum to students, including virtual and in-person lectures on advanced topics such as brute-force attacks, malicious traffic detection, and IP network analysis.

img

Retail Sales Associate

ActionLink

Developed and implemented a new marketing campaign demonstration software that effectively showcased the capabilities and features of new and current devices, resulting in a 11% increase in customer walk-ins within Walmart's electronics department.

img

Recent Projects

LinksByte

A Suspicious Link Detection Bot

Implemented Sandboxie and Python to create previews of weblinks before they are visited, precluding users from unintentional malicious downloads and personal data gathering. The application reduced user confrontation with phishing websites and fake application downloads. Implemented LinksByte to Discord, a instant messaging and digital distribution platform.

img

iExplore Malware

Malicious Application Process Exploration

Developed a new methodology for detecting malicious processes running within a portable executable file through the use of Process Explorer and Python; this new approach prevented DLL hijacking attacks and malicious file injections.

img

DecryptPETYA

PETYA Ransomware Encryption Vulnerabilities

Engineered an alternative means to decrypt data that had been encrypted through the PETYA ransomware attack by finding a vulnerability in PETYA’s known-plaintext attack within a cipher stream.

img

BruteDNS

Misconfigured DNS Scanner

BruteDNS was designed as a team to find and detect misconfigured DNS servers, alerting the user of the application of a cyberattack. Using multiple sequences and common penetration-testing services like NMAP & BlackBox, BruteDNS forced DNS zone transfers, gathering private network information.

img

Contact info