Hello there 👋, I'm

Nemanja Djurcic

Dedicated and skilled cyber security professional with a diverse skill set in programming, network administration, and security.

Seeking opportunities to use my expertise to enhance an organization's security posture and further develop my skills in this exciting field.

Enthusiastic about exploring advanced cybersecurity concepts, ethical hacking, and continuous learning.

Passion for coding, automation, and tech.

Available for freelance or full-time work. If you have a project that you want to get started, think you need my help with something, then get in touch.

Certifications

Projects

Cybersecurity Home Lab Environment

Built a comprehensive home lab for pentesting and security research, featuring isolated VMs, vulnerable applications, and hands-on exploitation scenarios. Includes network segmentation, intrusion detection, and security monitoring.

VirtualBox Kali Linux Metasploit Burp Suite OWASP Network Security Penetration Testing System Hardening

Reverse Engineering & Malware Analysis

Analyzed and reverse engineered malware samples and binaries using static and dynamic analysis techniques. Developed skills in disassembly, debugging, and threat assessment in isolated environments.

IDA Pro Ghidra OllyDbg WireShark Malware Analysis Binary Disassembly Threat Assessment Reverse Engineering

AI-Powered Security Threat Detection

Developed machine learning models for anomaly detection and threat identification in network traffic. Integrated with security tools to automate threat response and improve incident detection rates.

Python TensorFlow Scikit-learn Pandas Network Analysis Machine Learning Anomaly Detection SIEM Integration

Deep Learning Image Classification for Security

Built convolutional neural networks for automated security camera analysis and intrusion detection using computer vision. Trained on custom datasets for real-time threat identification.

Python TensorFlow Keras OpenCV Deep Learning Computer Vision CNN Neural Networks

Custom Cryptography & Encryption Tools

Implemented custom encryption algorithms and cryptographic tools for secure communication and data protection. Explored both classical and modern cryptography techniques.

Python Cryptography AES RSA Hashing Digital Signatures Key Management Security Protocols

Docker and Kubernetes Application Deployment

Managed and deployed applications using Docker and Kubernetes, showcasing strong skills in system administration and security.

Docker Kubernetes System Administration Security

Python Script Automation

Developed scripts in Python for automating tasks and enhancing operational efficiency in a self-hosted environment.

Python Automation Scripting Operational Efficiency

Palo Alto Networks Network Security

Implemented Palo Alto Networks solutions to design a secure network architecture, demonstrating practical understanding of network security.

Palo Alto Networks Network Security Architecture Design Practical Implementation

Skills

Firewall and Network Security

Containerized Firewall Firewall Configuration Host-based Intrusion Prevention Next Generation Firewall NGFW Virtual Firewall Network Infrastructure Security Network Security Threat Protection Zone Security Inbound traffic Outbound traffic

Cloud and Virtualization

AWS OCI (Oracle Cloud Infrastructure) Azure Cloud NGFW Kubernetes Kubernetes Operators Virtualization and Cloud Services

Security Operations and Incident Response

Security Operations Incident Response Evaluating Alerts The Cyber Kill Chain Evidence Handling And Attack Attribution

Security Policies and Compliance

Security Policies/Regulations/Standards Security Policies Data Privacy Data Security

Network and System Hardening

Defending Systems And Devices Defense-in-Depth Mitigating Common Network Attacks Network Hardening Physical Security Securing WLANs System And Endpoint Protection System And Network Defense Windows Security Wireless And Mobile Device Attacks

Cybersecurity Tools and Technologies

GlobalProtect Panorama Prisma Access Prisma SASE Prisma SD-WAN WildFire Cisco Devices Cisco IOS DHCP (Dynamic Host Configuration Protocol) DNS (Domain Name System) Wireless Access Access Control Cryptography Cyber Forensics Malware Identification Mobile Device Security Security Configuration Threat Analysis Threat Detection

Network Protocols and Design

IPv4 Subnetting Network Layer Protocols Transport Layer Protocols Network Media Network Types Protocols Standards

Log Management and Security Analysis

End Device Logs Hashing Integrity And Authenticity Network Logs Public Key Cryptography

Network and System Administration

Network And Server Profiling Penetration Testing Risk Assessment Risk Management Secure Device Management Security Assessments Security Controls

Programming Languages

Python Go Rust Nim

Infrastructure as Code and Containers

Ansible Terraform Docker

Operating Systems

Windows Linux

Languages

Serbian

I can navigate a kafana menu like a pro and debate the best way to grill cevapi! 🍖🍻

English

I'm fluent in English, I can talk the talk, walk the walk, and even rock the accent. 🚶‍♂️🗣️

German

I can speak it, but... Give me a couple of weeks and I'll be ordering schnitzel and bratwurst like a pro! 🥩🥓🌭

Spanish

¡Hablo un poco de español! I might not be fluent, but I can follow the dramatic twists of 'La Casa de Papel' with ease. 🏦💰

What's Next?

Say Hello