SCANNING FREQUENCIES...
click or press any key to skip

Security telemetry online

Sapit Brian

Cybersecurity Engineer
Security Strategy, Hardening & Automation

Helping organizations strengthen security posture through practical engineering, structured hardening, and controlled automation across critical operational surfaces.

About

Security thinking grounded in execution

I work across cybersecurity, systems engineering, and automation with a focus on practical risk reduction. My approach combines attack surface awareness, hardening, workflow design, and disciplined implementation to help systems remain secure, observable, and dependable in day to day operation.

  • Attack surface focused
  • Systems oriented
  • Operationally disciplined
  • Security first execution
  • Automation minded

Skills

Security capabilities

Security capability spectrum

Scroll into view to load — reload the page if the spectrum doesn’t appear.

Operational coverage across core security domains

Web Application Security

  • Attack surface review and web application security assessment
  • Vulnerability testing, triage, and practical remediation thinking
  • Security-conscious review of common web risk areas and exposure points

System Hardening

  • Linux service exposure review and hardening oriented configuration work
  • Environment tightening with reliability and maintainability in mind
  • Safer defaults for hosts, services, and deployment surfaces

Security Automation

  • Workflow automation for repetitive security and operational tasks
  • Structured handling of findings, checks, and follow-through activities
  • Tool-assisted processes that improve consistency without losing control

Monitoring & Visibility

  • Operational visibility through logs, telemetry, and status tracking
  • Improving awareness across systems, workflows, and security-relevant activity
  • Practical monitoring structures that support investigation and response

Vulnerability Assessment

  • Enumeration, scanning, and validation of exposed services and workflows
  • Review-driven identification of weaknesses, misconfigurations, and blind spots
  • Use of security tools to support focused, repeatable assessment work

Secure Engineering

  • Building and maintaining systems with security integrated into delivery
  • Safer release workflows, configuration discipline, and operational safeguards
  • Balancing implementation speed with correctness, control, and resilience

Projects

Security systems built with intent

PROGRAM: AI SECURITY OPSSTATE: ACTIVE

TamboSec

A security operations workflow designed to help smaller teams handle findings more consistently, coordinate remediation, and maintain visibility across approvals, alerts, and follow-through.

  • Use Case: SMB Security Operations
  • Focus: Detection & Remediation
  • Outcome: Better Follow Through
PROGRAM: AUTH SECURITYSTATE: VERIFIED

TOTP Auth

A time based one time password authentication project focused on secure login verification, enrollment flow, token validation, and practical second factor protection for user accounts and admin surfaces.

  • Use Case: Account Protection
  • Focus: MFA & Verification Logic
  • Outcome: Stronger Login Security
PROGRAM: BLOCKCHAIN SECURITYSTATE: ACTIVE

Blockchain Integrity Monitor

A blockchain focused project centered on transaction monitoring, integrity checks, event visibility, and secure handling of chain activity where trust, traceability, and validation matter most.

  • Use Case: Chain Activity Oversight
  • Focus: Integrity & Monitoring
  • Outcome: Better Transaction Visibility
PROGRAM: WORKFLOW R&DSTATE: ACTIVE

Automation Experiments

A collection of workflow and tooling experiments focused on reducing manual security overhead, improving operational consistency, and making routine security work more repeatable through controlled automation.

  • Use Case: Internal Security Workflows
  • Focus: Orchestration & Tooling
  • Outcome: Reduced Manual Overhead
PROGRAM: SIEM VISIBILITYSTATE: ACTIVE

Insight SIEMs

A security visibility project designed around alert correlation, log aggregation, event triage, and clearer operational insight across monitored systems and security relevant activity streams.

  • Use Case: Security Monitoring
  • Focus: Logs & Alert Correlation
  • Outcome: Improved Operational Visibility
PROGRAM: NETWORK ANALYTICSSTATE: ACTIVE

Net Anomaly Detector

A network anomaly project built to surface unusual traffic patterns, highlight deviations from expected behavior, and support early investigation of suspicious events within monitored environments.

  • Use Case: Traffic Analysis
  • Focus: Detection & Baselines
  • Outcome: Faster Anomaly Discovery

Contact

Contact for security-focused work

01

Email

bolesapit@gmail.com

Start Conversation
02

GitHub

github.com/Bryn018

Review GitHub
03

LinkedIn

LinkedIn to be added

Pending