Developer

Hey, I’m Jack,
Full-Stack Developer & Cyber Security Specialist

My work spans full-stack development, cloud engineering, digital forensics, and Cyber Security.
4Years
20Projects
6Certs
16Stack
4Years Dev
3Years Cyber

Animated graphic

Open to full-time roles, contract work, and freelance development or security projects. I work across both software engineering and cyber operations, building practical tools and solving real security problems.

I build secure web apps, automate workflows, analyse logs, investigate incidents, and design small-scale systems that blend development with defensive capability. I regularly work with SIEMs, packet captures, threat detections.

Whether it's building a tool, analysing an environment, or securing a system, my focus is always on clarity, reliability, and real-world impact. Explore my skills and projects below, and feel free to reach out any time through the contact form.

Skills

Full-Stack Web Development

Designing and building responsive, accessible, and secure applications.

  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • React
  • Django

Application Development

Building reliable tools, backend services, automation scripts, and secure system utilities.

  • Python
  • Django
  • Bash
  • PowerShell
  • APIs
  • Automation

Digital Forensics & Blue Teaming

Detection engineering, incident response, forensic analysis, and SOC tooling.

  • SIEM
  • ELK
  • Splunk
  • Velociraptor
  • KAPE
  • Wireshark

Cloud & DevOps

Deploying secure, scalable infrastructure with automation and monitoring.

  • AWS
  • Azure
  • Linux
  • Nginx
  • Docker
  • Terraform

Pentesting & Offensive Security

Practical exploitation, enumeration, privilege escalation, and OSCP-style labs.

  • Nmap
  • Burp Suite
  • Hydra
  • LLMNR
  • SMB
  • Payload Crafting

Systems Administration

Managing and hardening servers, networking, and enterprise environments.

  • Windows Server
  • Active Directory
  • Linux Admin
  • Bash
  • Powershell

Projects

Network Engineering with CPT with Man in the middle attack screenshot 1 Network Engineering with CPT with Man in the middle attack screenshot 2 Network Engineering with CPT with Man in the middle attack screenshot 3

Network Engineering with CPT with Man in the middle attack

A man-in-the-middle (MITM) attack was simulated by placing a packet-sniffing device between two routers in a controlled network. The attacker was able to capture DNS and HTTP traffic between the client and the server. Because HTTP traffic is unencrypted, the attacker could view the full contents of web requests and responses.

  • Cisco
  • MITM
  • Cyber
  • Lab
Building jackbellportfoilo.com screenshot 1 Building jackbellportfoilo.com screenshot 2 Building jackbellportfoilo.com screenshot 3

Building jackbellportfoilo.com

This website is a ongoing project of mine Built using PHP in the backend and mysql for a database to store the projects

  • Php
  • mysql
  • html
  • css
  • javascript
View project →
Exploiting log4j in hack the box unified screenshot 1 Exploiting log4j in hack the box unified screenshot 2 Exploiting log4j in hack the box unified screenshot 3

Exploiting log4j in hack the box unified

Exploited the Unifi service on port 8443 (LDAP) with CVE-2021-44228 gaining access to a Mongo database with admin credentials on the target mechine

  • Mongo
  • Hacking
  • HTB
  • Linux
View project →

Let’s Work Together