Hardware builds, power systems, embedded firmware, infrastructure modeling, and lab investigations — all documented with measurable outcomes and engineering rationale.
Lab simulations are conducted in controlled environments for academic and professional development. No real systems were targeted.
Real-time power monitoring node using an ESP32 to calculate RMS Voltage, Current, and Power Factor with <3% error margin. Firmware FFT algorithm detecting Total Harmonic Distortion in sub-100ms intervals. AES-128 + MQTT TLS 1.2 securing data transport for NERC CIP-compliant handling on a Proxmox-based Control Center.
ESP32-based power distribution unit monitoring real-time loads with ±0.5% current sensing accuracy. PWM trip-logic preventing overcurrent while maintaining system stability within 10% of peak rated capacity. Bench-validated with digital oscilloscopes — active RC filtering reduced electrical noise (Vpp) by 35%.
Multi-articulated walking robot powered by a Raspberry Pi 3 and Adafruit 16-Channel PWM Servo Driver. 12V-to-6V DC-DC power regulation system designed in SOLIDWORKS Electrical to manage 11.1V 1300mAh LiPo discharge rates. Python-driven bipedal gait automation utilizing 9 metal-gear servos for high-torque motion.
Dell OptiPlex 5050 + Proxmox VE hypervisor running multi-tier networked environments. MATLAB load-flow simulations identifying service recovery strategies and optimizing grid restoration time by 22%. PulseGrid AI models cascading failure propagation across 7 infrastructure layers (500+ unique outage scenarios). Bash scripts reduce manual diagnostic time by 40%. Also hosts DFIR lab exercises — isolated network attack/defense environments with pfSense for firewall and inter-VLAN routing.
Simulated DFIR exercises conducted on the isolated homelab infrastructure. Methodological documentation of network forensics and incident response workflows.
Simulated forensics exercise: baseline comparison, packet-level traffic analysis, persistence validation, and structured timeline reconstruction. Analyzed 7,000+ frames and 86 TCP conversations under NIST SP 800-61 methodology.
Planned homelab DFIR simulation: deterministic attack chain (DVWA exploit → foothold → root via misconfiguration → SSH/systemd persistence → staged exfiltration) with evidence-backed timeline reconstruction.