Skip to content
View menotliam's full-sized avatar
🀨
Working from home
🀨
Working from home

Highlights

  • Pro

Block or report menotliam

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
menotliam/README.md

Hi there, I'm Giang πŸ‘‹

Aspiring SOC Analyst & Security Engineer | CS Student at HCMUT

LinkedIn Email


πŸ“„ Professional Resume

Click here to view my Resume (PDF) > (Note: This link leads to my detailed CV for SOC Tier 1 position).


πŸ›‘οΈ Executive Summary

I am a Junior Computer Science student at Ho Chi Minh City University of Technology (HCMUT), specializing in Cybersecurity and Security Operations (Blue Team). My approach bridges the gap between technical execution and business risk. Whether I am analyzing web vulnerabilities, designing network architectures, or building ML-based threat detection pipelines, my goal is to ensure continuous monitoring, rapid incident response, and actionable remediation.

Core Competencies:

  • Threat Detection & Investigation: Identifying attack patterns, analyzing raw logs, and performing root-cause analysis.
  • Risk Translation: Converting complex technical flaws into clear, actionable business risks using a Consultative Methodology.
  • Security Architecture: Designing secure, segmented networks based on the CIA Triad and Defense-in-Depth principles.

πŸ’» Tech Stack

  • Languages: Python, C++, Bash, SQL (MySQL), Powershell, HTML.
  • SIEM / EDR & Monitoring: Wazuh, SentinelOne (Overview), Wireshark.
  • Security Tools: Kali Linux, Metasploit, Burp Suite, Postman, Gobuster, Nmap.
  • Network: Cisco Packet Tracer, VLAN, VPN, OSPF, ASA Firewall.
  • Frameworks & Standards: OWASP Top 10, NIST, MITRE ATT&CK.

πŸš€ Featured Security Research & Projects

An end-to-end supervised machine learning pipeline engineered to detect phishing emails with 98.72% accuracy, focusing on behavioral resilience rather than easily evaded blacklists.

  • Recall-First Optimization: Tuned XGBoost specifically to minimize False Negatives, recognizing that undetected threats are more critical than false alarms.
  • Threat Intelligence: Engineered 54+ Indicators of Compromise (IOCs) across email headers, body sentiment, URL entropy, and macro-enabled attachments.
  • Incident Triage: Conducted structured error analysis to document residual risks, enabling SOC analysts to triage alerts with deep behavioral context.

A centralized documentation hub for vulnerability research, bridging the gap between technical exploits and strategic remediation.

  • Advisory Approach: Every write-up follows a strict methodology: Reconnaissance βž” Exploit (PoC) βž” Root Cause Analysis βž” Business Risk Assessment βž” Remediation.
  • Web Exploitation: Documented real-world scenarios including Arbitrary File Uploads leading to RCE, Error-Based SQLi, and Weak 2FA exposures.
  • Actionable Reporting: Mapped findings to OWASP standards to provide code-level fixes and architecture-level defenses.

A secure, scalable 3-tier enterprise network design for a multi-site hospital system, simulated in Cisco Packet Tracer.

  • Network Segmentation: Implemented strict VLAN isolation for Staff, Medical Devices, and Guests to limit lateral movement.
  • Perimeter Defense: Configured Cisco ASA Firewalls, Access Control Lists (ACLs), and a dedicated DMZ for public web servers.
  • Secure Communications: Deployed Site-to-Site and Remote-Access VPNs to simulate secure telehealth and remote administration.
πŸ› οΈ Bonus Project: Secure IoT Data Pipeline via Blockchain (Click to expand)

A security-first research prototype preventing IoT data forgery, tampering, and replay attacks.

  • Cryptography: Implemented AES-256-GCM for authenticated encryption and ECDSA (secp256k1) for device non-repudiation.
  • Data Integrity: Anchored cryptographic proofs on a local Ethereum EVM while storing raw payloads on IPFS.

πŸ† Certifications & Achievements

  • Google Cybersecurity Professional Certificate: Completed 8-course program covering SIEM tools, incident response lifecycle, network traffic analysis, and security frameworks (NIST, OWASP)
  • Top 40 BK Innovation (2025): Formulated and Pitched successfully a conceptual security architecture utilizing Blockchain to IoT ecosystems.

Always open to discussing Cybersecurity, Risk Advisory, and system architecture. Let's connect!

Pinned Loading

  1. CTF-Writeups CTF-Writeups Public

    This repository serves as a centralized documentation hub for my Capture The Flag (CTF) write-ups, vulnerability research, and security architecture case studies.

    EJS 1

  2. phishing_detect_AI phishing_detect_AI Public

    A supervised machine learning pipeline that detects phishing emails by engineering rich set of behavioral and structural features.

    Python 1

  3. Hospital-Network-Security-Architecture-Design Hospital-Network-Security-Architecture-Design Public

    Presents a secure and scalable enterprise network design for a multi-site hospital system, implemented using Cisco Packet Tracer.

    1

  4. Intergrating-Blockchain-In-IOT Intergrating-Blockchain-In-IOT Public

    A security-first research prototype that enforces IoT data authenticity, confidentiality, integrity, and replay resistance by anchoring cryptographic proofs on a local Ethereum blockchain (Ganache)…

    Python 1

  5. Chatbot-AI-4Enterprise Chatbot-AI-4Enterprise Public

    A modern, production-oriented AI chatbot platform built with FastAPI, OpenAI, and MongoDB. The project provides a two-stage response pipeline (initial assistant reply + optional enhancement), persi…

    Python 1

  6. Enhanced-Video-Retrieval-System Enhanced-Video-Retrieval-System Public

    A model for video retrieval from a big corpus of national data, integrated OCR, ASR, RAG-based retrieval for efficient search.

    Python 1