Security Engineer & Threat Researcher

Defending the Digital
Frontier with Zero Trust

UMGC graduate in Software Development & Security. Passionate about Zero Trust Architecture, vulnerability research, and building resilient systems that are secure by design.

6+
CVEs Analyzed
7
OSI Layers Secured
ZTA
Architecture Focus
threat-intel.sh
$ ./scan --mode=critical --year=2026   [+] Scanning CVE database... [+] 3 critical CVEs active in Feb 2026   [!] CVE-2026-22769 CVSS 10.0 — Dell RecoverPoint [!] CVE-2026-2441 CVSS 8.8 — Chrome UAF RCE [~] CVE-2026-20700 CVSS 7.8 — Apple dyld Zero-Day   [+] Zero Trust posture: ACTIVE [+] Microsegmentation: ENABLED [+] Threat monitoring: RUNNING   $

Active Threat Advisory — February 2026

Three new critical CVEs confirmed actively exploited: CVE-2026-22769 (Dell RecoverPoint, CVSS 10.0, CISA KEV), CVE-2026-2441 (Chrome UAF RCE, CVSS 8.8), and CVE-2026-20700 (Apple dyld zero-day, CVSS 7.8). Patch all affected systems immediately. Read the full analysis →

Latest Vulnerability Research

Recent Blog Posts

Areas of Expertise

🛡

Zero Trust Architecture

Designing and implementing Zero Trust frameworks across all seven OSI layers, eliminating implicit trust and enforcing continuous verification.

🔍

Vulnerability Research

In-depth CVE analysis, root cause investigation, and proof-of-concept evaluation to help organizations understand and prioritize risk.

🖧

Network Microsegmentation

Designing segmented network topologies that contain lateral movement, isolate critical assets, and minimize blast radius of breaches.

💻

Secure Software Development

Applying secure coding principles, input validation, and threat modeling to build applications that resist the OWASP Top 10 and beyond.

Incident Response

Rapid triage and forensic analysis of active intrusions, including web shell detection, lateral movement tracing, and containment.

📊

Threat Intelligence

Tracking threat actor TTPs, monitoring CVE feeds, and translating raw intelligence into actionable defensive measures.

Zero Trust Across the OSI Model

The OSI model provides a fundamental blueprint for network communication. For security engineers, implementing Zero Trust means eliminating any assumption of inherent trust — every request, packet, and session must be continuously verified.

Read full article →
L7 Application Secure coding, API authentication, input validation, WAF
L6 Presentation TLS 1.3 enforcement, certificate pinning, data encryption
L5 Session Continuous session validation, real-time anomaly detection
L4 Transport mTLS, certificate-based auth, encrypted transport
L3 Network Microsegmentation, packet inspection, IDS/IPS, firewall rules
L2 Data Link 802.1X port auth, VLAN isolation, MAC filtering
L1 Physical Physical access controls, tamper detection, secure hardware