Welcome!
From pixels to packets, I have transitioned from design to networks and cybersecurity.
Join me exploring how creativity, empathy, and logic can help build safer digital worlds.
Here’s where cyber defense techniques and design vision come together. Dive into a showcase of projects that spans from mapping user behavior to threat management—each one a step in my journey from creative insights to safeguarding data.
This project involved setting up a network with a Raspberry Pi as honeypot, to analyze vulnerable systems and lure attackers. The primary goal was to simulate real-world attack behavior in a controlled environment.
With little competition in the Android space, Android Auto faces usability and satisfaction issues. The redesign focused on enhancing accessibility and overall user experience, by adding an instant language switch feature to the system.
...emphasizes the human element. Aims at robust and usable solutions, making compliance easier and reducing human errors.
...fosters quick thinking and rapid iterations, which means a creative approach to threats and solutions to ever-evolving attack vectors.
...translates complex problems into clear and assertive communication, bridging the gap between tech and non-tech stakeholders.
...improves pattern recognition and attention to detail, essential for threat detection and incident response.
...balances user needs and business goals. A collaborative mindset is highly desired to align stakeholders' expectations.
...provides critical insights to user experience, avoiding unnecessary risk exposure due to user friction and system misuse.
Ready to discover how we can leverage security without compromising the user experience in your service or product? Let’s connect and grow together.