22 more images
|
Cosmo
Bringing order to Cyber Operations
A cyber threat intelligence platform built with the cyber planner in mind.
- Rebuilt OpenCTI interface to follow streamlined workflow to control ingestion, triage alerts and fine tune ML engine analysis
-
Wrote all parsers for transforming emails and various log formats into appropriate STIX2 objects
-
Built ingestion system to support custom configurations and toggle persistent storage of Observables while preserving analysis and prediction with or without historical data.
-
Wrote test cases and reproducible pen test with ZAP Security Scanner to validate performance, processing and predictions.
-
Used Stix2 ANTLR4 grammar for pattern matching log data with existing Indicators of Compromise
-
Leveraged inference engine settings to automated indirect relationships between different Stix objects
|
|
Imagerie
A TensorFlow training interface
Automate quality assurance with image detection
- Built interface and middleware components to robust automated image training program
- Express Server as proxy service to upload / download photos from Minio / AWS S3 and other storage services
- Drop and Drop photo library manager for building trainings from remote and local photos
- Customized Tree component for infinite nesting of tags under photos, and easier review of tag and photo collections with counts and average region sizes
- Customized drawing component for creating, dragging, and resizing tags with 0 - 400% magnified zoom window
- User defined categories, tag names, and tool sets
- Automated demo builder with customizing parameters
- Webpack 4 hotloading development environment with testing, production and development build scripts for packing and deployment
|