Building Secure
Infrastructure
at Scale

Cybersecurity student β€’ Security Engineering β€’ Cloud Security

About Me

about_me.sh
Nazariy Buryak
$ whoami
Nazariy Buryak

$ age
18 Years Old

$ role
Cybersecurity Student > Cloud Security / DevSecOps

$ location
Portlaoise, Ireland

$ studying_at
South East Technological University, Carlow

$ focus
- AWS infrastructure security
- GCP fundamentals
- Secure CI/CD patterns
- Docker + Kubernetes basics
- Threat modeling & hardening

Relevant Experience

Cohort

Carlow: September 2025 - Present

Cloud Infrastructure & DevOps Engineer

  • Designing secure, scalable AWS cloud infrastructure encompassing networking, databases, SSL/TLS certificates, routing, caching, and containerized services.
  • Working on automating container image builds and deployment using Dockerfiles.

Amazon Web Services

Zurich: September 2025

Summit Participant

  • Learned how to secure systems and use safety protocols for autonomous agents.
  • Studied identity security and how it connects with Kubernetes and CI/CD pipelines.
  • Helped design global network setups using AWS services.
  • Took part in CTF challenges and card games to improve cybersecurity skills and explore new attack and defense methods.

Technical Skills

Programming Languages

Python Java Go JavaScript Bash C PHP HTML CSS

Cloud & DevOps

AWS Terraform Docker Kubernetes GCP Azure Git Jenkins SonarQube

Networking

Cisco VLAN setup & segmentation Cisco STP tuning Cisco Trunk/access ports Cisco DHCP config Cisco Port Security Cisco Switch/router troubleshooting

Cyber Security Tools

Wireshark Wireshark Nmap Nmap Metasploit Metasploit Hydra Hydra OWASP ZAP OWASP ZAP Burp Suite Burp Suite

Databases

PostgreSQL MongoDB MySQL

Systems

Linux Windows macOS

Soft Skills

πŸ’¬

Effective Communication

Clear and concise communication when collaborating on security projects, writing documentation, and presenting technical findings

🎯

Problem Solving

Analytical and structured approach to troubleshooting system issues and resolving security challenges in dynamic environments

πŸŽ“

Event Participation

Active involvement in technical events and security communities to strengthen teamwork, knowledge sharing, and professional growth

πŸ”

Analytical Thinking

Data-driven mindset for identifying root causes, optimizing scripts, and improving system reliability through precise testing

πŸ§˜β€β™‚οΈ

Calm Under Pressure

Maintains focus and composure when diagnosing complex issues or working under tight deadlines in security-critical scenarios

Projects

GhostState

Cloud Security
  • Description: My big ongoing project, TUI-based (Terminal User Interface) security and governance tool for AWS written in Go. It scans cloud infrastructure in real-time to identify "Ghost" resources (unused/shadow IT) and "Risk" assets (critical vulnerabilities), featuring a hexagonal architecture for multi-provider extensibility.
  • Stack: Go (Golang), AWS SDK v2, Bubble Tea (TUI), Hexagonal Architecture

GhostWeights

Cloud Security/Pentesting
  • Description: GhostWeights is a specialized cloud security tool written in Go. It hunts for "Shadow AI"β€”unauthorized AI/ML workloads running in your AWS environment.
  • Stack: Go (Golang), AWS SDK v2

WAFPierce

Web & Cloud Pentesting
  • Description: CLI & GUI tool, it is WAF/CDN fingerprinting and bypass validation tool for pentesting across cloud providers. It detects 17+ WAFs and 12+ CDNs, runs 35+ bypass/evasion techniques with baseline heuristics (status, size, hashes), and outputs Markdown reports.
  • Stack: Python

Log_Analyer

Security Analysis
  • Description: A Python tool that reads security logs line-by-line to detect brute-force login attempts, SQLmap-style SQL injection scans, and attack patterns by IP, time, and frequency, generating statistical reports and charts.
  • Stack: Python, JSON.

Image-Detector-AWS

Cloud AI
  • Description: Serverless image analysis system using AWS Lambda, S3, Rekognition, and DynamoDB that automatically detects and labels objects in uploaded images.
  • Stack: AWS Lambda, S3, Rekognition, DynamoDB

TCP_Recon_Tool

Security Analysis
  • Description: Command-line Python reconnaissance tool recon.py that probes targets, enumerates services and HTTP apps, inspects TLS, fingerprints web stacks, and emits machine-readable reports.
  • Stack: Python, JSON

AWS-IAM-Security-Intern-Access-Control

Cloud Security
  • Description: Restricts intern access so they can manage only development EC2 instances while keeping production locked down, using custom JSON policies and tag-based permissions.
  • Stack: AWS EC2, IAM, JSON permissions

S3_Storage

Cloud
  • Description: Python tool to upload files asynchronously to any S3-compatible storage using aiobotocore.
  • Stack: Python(aiobotocore)

StudyNotes2Audio(In progress)

Serverless Application
  • Description: A serverless text-to-speech conversion system that transforms your study notes into portable audio files.
  • Stack: AWS Lambda, Amazon Polly, S3, HTML/CSS, JavaScript

Education

Ordinary BCs Cybercrime & IT Security

September 2024 – Present β€’ South East Technological University, Carlow

  • Graduating in August 2027.
  • Learning security scripting, networking and web security.
  • Developing skills in security automation, security analytics and hardening.

Leaving Certificate

September 2019 – May 2024 β€’ Portlaoise College

  • Strong foundation in STEM subjects supporting cybersecurity and IT studies.
  • Active participation in technology-focused classes.

Certifications

TryHackMe

  • DevSecOps Certificate β€” issued May 2025.
  • Security Engineer Certificate β€” issued May 2025.

Digital Cloud Training

  • AWS Certified Solutions Architect – Associate Course β€” issued August 2025.

My learning paths, and certifications can be found on my Linktree .

Get In Touch

Interested in collaboration, internships, or any question? Feel free to reach out!

Β© Nazariy Buryak.