session armed
whoami
abraham@recon:~$
Abraham
Cybersecurity Specialist
Protecting Digital Assets
status
monitoring edges
ABRAHAM
Cybersecurity Specialist focused on defense-in-depth, network hardening, and resilient incident response. Building automation to keep systems sound.
Live Signal
Scan loops stable • Threat intel synced • IDS overlays nominal
About
I’ve dedicated my career to defending digital systems. With a focus on practical security engineering and automation, I architect defenses and harden networks across cloud and on-prem environments. My approach is technical, measurable, and iterative—aligning controls with business risk.
Tools
Kali, Wireshark, Metasploit
Languages
Bash, Python
Domains
Network, AppSec
Certs
OSCP
Sec+
GXPN
Ethics
Practice responsible vulnerability research and always obtain proper authorization.
Skills
Network Security
Firewalls, IDS, segmentation, threat hunting
TCP/IP
802.1X
Zero Trust
Penetration Testing
Recon, exploiting, reporting to remediation
Metasploit
Burp
Beacons
Automation
Scripts, pipelines, telemetry, safe coding
Bash
Python
Ansible
Experience & Journey
2022–Present
Security Engineer
Cloud infra hardening, monitoring, and incident response.
2020–2022
Penetration Tester
External/internal engagements, reporting, and remediation tracking.
2018–2020
Security Analyst
SIEM tuning, detections, dashboarding, and access governance.
Blog Highlights
Write-up
Zero-trust on border routers
Evaluating identity and device posture at the edge.
Lab
BPF-based netfilter tuning
Lowering overhead while keeping coverage high.
Research
Common SSH pitfalls
Permissions, keys, and audit controls.
Contact
Open to collaboration, learning, and security conversations. Reach out to share ideas, labs, or projects.
Email
contact@abraham.dev
Get in touch
Built with discipline. No gradients. No neon. Just red accents, white space, and order.