Profile Summary
I’m passionate about legal and development work that helps create credible, compliant technology and businesses.
Education
Skills & Expertise
GRC & Audit
Security & QA
OWASP ZAP
OWASP ASVSIntellectual Property Strategy
Programming & Frameworks
Data & Analytics
Tools & Platforms
Work Experience
A GRC-Based Framework for Automating Audit Workflows via Continuous Assurance. A hybrid GRC framework designed to automate the mapping of technical controls to governance standards, eliminating the '72-hour blind spot' in traditional audits.
A data-driven prioritization system recognized as KadaKareer Kollab's Choice Winner focused on transparency and justice in government technology funding.
Regulatory-Driven Computational Design and Verification System (Patent in Preparation)
A system that automates the checking of building laws and regulatory compliance within architectural designs.
A network security tool that automates the identification of unusual packet lengths in network traffic to flag potential threats using CDF analysis.
An AI-powered advisory platform developed during the BPI Hackathon aimed at simplifying complex loan structures and enhancing financial literacy for small business owners.
IMARE (Informative Malware Tool for Cybersecurity Updates, Detection, and Investigation)
A unified threat intelligence hub that centralizes malware analysis and real-time vulnerability news into a single dashboard using multiple security APIs.
Image Metadata Security (Thesis)
A research-driven project developing a novel algorithm that integrates cryptography and steganography to secure Exchangeable Image File Format (EXIF) metadata against privacy leaks and unauthorized extraction.
Certificate
AI & Data Privacy
My undergraduate thesis combines cryptography and steganography to secure hidden image data

As the principal researcher, I developed a novel algorithm that combines cryptography and steganography to secure privacy-related EXIF metadata in digital images. The system extracts metadata from JPEG and HEIC files, hashes user passwords with Argon2 to derive an AES encryption key, and encrypts the metadata. The AES key is then secured using RSA-OAEP for safe exchange. Using Shannon entropy, the algorithm identifies the busiest regions of an image to embed the encrypted metadata via Least Significant Bit (LSB) steganography, preserving image integrity (evaluated using PSNR and SSIM metrics). A proof-of-concept freeware was built with Django to demonstrate the feasibility and practicality of the algorithm, verified against the ISO 25010 quality model.
Get in Touch
I am currently open to roles in IT audit associate, GRC, and cybersecurity, so if my technical background and problem-solving approach aligns with your company's goals, let's connect on linkedin or just shoot me an email.
Let's build secure and compliant systems together!
