Projects & Selected Work

A collection of systems I've designed and implemented to solve real operational and security problems.

Automated IP reputation checker workflow

Automated IP Reputation Classification

Built an automated workflow that processes firewall IP addresses in controlled batches, classifies them as malicious or clean using reputation intelligence, and prepares results for reporting while respecting API limits and failure conditions.

Security Automation Cloud
Read more

How it works

The workflow is designed to safely process large IP datasets under real-world constraints.

IP addresses are read once from a source spreadsheet and cached in memory to minimize repeated reads and avoid quota exhaustion. A batch controller processes two IPs at a time with a timed delay to comply with third-party API rate limits.

Before analysis, each IP passes through a validation gate to detect and skip private or invalid ranges, preventing unnecessary errors. Valid public IPs are sent to an external reputation service for analysis and classified as malicious or clean based on predefined criteria.

Results are merged and returned to the batch controller, allowing the pipeline to continue running regardless of mixed outcomes or partial failures.

Key design considerations

  • Rate-limited batch processing
  • API quota protection
  • Input validation before execution
  • Failure-tolerant looping and retry handling
  • Continuous execution without hard stops

Outcome

The workflow eliminates manual IP reputation checks, safely processes large datasets, and integrates cleanly into existing reporting workflows. It reduces manual classification effort by approximately 80% while maintaining accuracy and operational stability.

Authentication monitoring and alerts dashboard

Authentication Monitoring & Alerts

Implemented monitoring to detect abnormal sign-in behavior, including repeated failed login attempts, and generate alerts to support faster response.

Security Automation Monitoring
Read more

The system tracks authentication patterns across multiple dimensions, including geographic anomalies, time-based patterns, and device fingerprinting to identify potentially compromised accounts.

Alerts are prioritized based on risk scoring and routed to appropriate teams, enabling response times under 15 minutes for high-priority incidents.

Process and data systems dashboard

Process & Data Systems

Designed spreadsheet-based systems to improve accounting visibility, projections, and follow-ups by enforcing structured, consistent data.

Data & Process Design
Read more

The system enforces data validation rules, automated calculations, and standardized templates to eliminate manual errors and reduce processing time.

Built-in workflows track follow-ups and deadlines, ensuring nothing falls through the cracks while providing clear visibility into project status and financial projections.