1:"$Sreact.fragment" 2:I[91389,["/_next/static/chunks/d9e0d68f528a2dc6.js","/_next/static/chunks/ea6bdb0d940bcd8e.js","/_next/static/chunks/537d354b60c3ef65.js"],"default"] 3:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/d2be314c3ece3fbe.js"],"OutletBoundary"] 4:"$Sreact.suspense" 0:{"buildId":"bJ-pHYGFcnjokhVAm8kTC","rsc":["$","$1","c",{"children":[["$","main",null,{"className":"min-h-screen bg-[#F8F9FA]","children":["$","$L2",null,{"project":{"id":"11","title":"Threat Hunting AI","description":"Advanced neural networks constantly hunt for zero-day vulnerabilities across a company's internal servers, detecting breaches hours before existing systems.","image":"https://images.unsplash.com/photo-1518770660439-4636190af475?q=80&w=2070&auto=format&fit=crop","link":"/portfolio/11","category":"Cybersecurity","year":"2024","duration":"8 Months","technologies":["SvelteKit","Rust","Apache Flink","TensorFlow","AWS Security"],"features":["Neural network anomaly detection identifying slow data exfiltration and lateral server movement.","Petabyte-scale network traffic log ingestion via Apache Flink stream processing.","Automated Level-1 incident containment isolating compromised nodes without human intervention.","Live network topology graph visualization showing active threat vectors and affected nodes.","Threat intelligence integration pulling from global CVE and IOC databases in real time.","Compliance reporting module generating SIEM-compatible logs for SOC audit requirements."],"challenge":"A top-tier financial institution was facing increasingly sophisticated, automated cyber attacks. Their legacy security information and event management (SIEM) tools generated too much noise, causing alert fatigue among security analysts and delaying critical response times to actual threats.","solution":"We deployed a blistering fast anomaly detection engine written in Rust to ingest and monitor petabytes of network traffic logs via Apache Flink. The proprietary neural network isolates highly subtle adversarial movements (like slow data exfiltration or lateral server movement) that signature-based tools miss entirely. A highly responsive SvelteKit dashboard visualizes the network graph and attack vectors in real-time.","results":["Reduced mean time to detect (MTTD) breaches from 12 hours to less than 4 minutes.","Dropped false-positive alert volume by a staggering 92%.","Automated Level 1 incident response containment, preventing lateral movement instantly.","Secured over $50B in assets under management across a global 10,000-node network."]}}]}],[["$","script","script-0",{"src":"/_next/static/chunks/537d354b60c3ef65.js","async":true}]],["$","$L3",null,{"children":["$","$4",null,{"name":"Next.MetadataOutlet","children":"$@5"}]}]]}],"loading":null,"isPartial":false} 5:null