SECUREPATH

Projects

Real work, real proof. These projects connect architecture thinking with hands-on security implementation — across web, APIs, and cloud.

API/Cloud SecuritySecurity ArchitectureWeb SecurityEvidence & Writeups
Search
Status
Domain
Showing 5 projects
Featured project

SecurePath Portfolio (This Site)

A security-focused portfolio built to showcase API/Cloud Security, Security Architecture, and evidence-backed labs with a clean, recruiter-friendly UI.

CurrentFeatured
Security ArchitectureAPI SecurityCloud SecurityWeb SecurityFull Stack
Highlights
  • Architect-style structure: boundaries, risks, controls, and evidence strategy
  • Projects include detail pages (Threats → Controls → Evidence)
  • Designed for fast scanning: tags, maturity indicator, and clear navigation
Tech
Next.jsTypeScriptTailwind CSSVercel
Portfolio maturity80%
(This reflects how complete the writeup/evidence is — not “how good” you are.)
Evidence
WRITEUPSecurity Snapshot page (architecture overview)(Available)REPORTProjects system + detail pages(Available)WRITEUPBlog writeups (published + planned)(Planned)
Evidence links activate on project detail pages as artifacts are published.

Home Server Security Architecture + Monitoring

Hybrid edge-to-cloud Zero Trust build in progress. Architecture and design are documented (PDF), with implementation underway for segmentation, monitoring, and encrypted cloud storage.

Current
Security ArchitectureCloud SecurityAPI SecurityWeb SecurityDetection/IR
Highlights
  • Architecture completed: hybrid edge-to-cloud Zero Trust design with clear trust boundaries
  • Edge enforcement: DNS-based policy controls and device access classification
  • Cloud vault: encrypted storage with least-privilege IAM and audit logging
  • Monitoring roadmap: central logging + detection signals for investigation
Tech
VyOSLinuxWazuhNessusDockerAWS S3IAM/KMSCloudTrail
Portfolio maturity65%
(This reflects how complete the writeup/evidence is — not “how good” you are.)
Evidence
REPORTArchitecture & Design Document (PDF): Hybrid Edge-to-Cloud Zero Trust(Available)CONFIGNetwork segmentation rules (VyOS export/screenshot)(Planned)SCANScan results before/after (Nessus)(Planned)WRITEUPMonitoring alerts + notes (Wazuh)(Planned)
Evidence links activate on project detail pages as artifacts are published.

API Security Case Study (AuthZ, Tokens, Abuse Prevention)

A portfolio-ready API security case study focusing on authorization, token handling, validation, rate limiting, and logging for investigation.

Planned
API SecurityWeb SecuritySecurity Architecture
Highlights
  • Focus on authz correctness (prevent IDOR / broken access control)
  • Threat model + mitigations mapped to practical controls
  • Evidence: test cases, logs, and defensive validation patterns
Tech
REST APIsJWT/OAuth ConceptsLogging/AuditingPostman
Portfolio maturity20%
(This reflects how complete the writeup/evidence is — not “how good” you are.)
Evidence
WRITEUPWriteup (coming soon)(Planned)
Evidence links activate on project detail pages as artifacts are published.

Web App Hardening + OWASP Mapping

A web security project showing validation, auth/session hygiene, secure headers, and logging tied to OWASP-style risks and verified with tests.

Planned
Web SecurityAPI SecurityDetection/IR
Highlights
  • Practical hardening checklist: headers, validation, auth/session handling
  • OWASP-style framing without overcomplication
  • Evidence: testing notes, before/after behavior, and security signals
Tech
Next.jsAuth PatternsSecure HeadersValidation
Portfolio maturity15%
(This reflects how complete the writeup/evidence is — not “how good” you are.)
Evidence
REPORTHardening checklist(Planned)
Evidence links activate on project detail pages as artifacts are published.

Security Reporting + BI (Dashboards & Evidence Tracking)

Translating technical security signals into readable dashboards, summaries, and executive-friendly insights.

Past
BI/DataGRCDetection/IR
Highlights
  • Turn technical activity into clear reporting and decision support
  • Evidence tracking: what changed, why, and how it was verified
  • Useful for GRC alignment and communication
Tech
ExcelSQLReportingData Modeling
Portfolio maturity45%
(This reflects how complete the writeup/evidence is — not “how good” you are.)
Evidence
REPORTReporting template(Planned)
Evidence links activate on project detail pages as artifacts are published.