Skip to content
View wiktoria-migasiewicz's full-sized avatar

Block or report wiktoria-migasiewicz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

👋 Hi, I'm Wiktoria

TryHackMe Top 15%

🎯 Cybersecurity Graduate from Wrocław University of Science and Technology

💻 Software Engineer for 2 years

🛡️ ISC2 Certified in Cybersecurity (CC)

⭐ In top 15% users on TryHackMe


🚀 About Me

I’m a cybersecurity-focused IT professional with over 2 years of hands-on experience in software engineering and test automation.

My background in QA, CI/CD pipelines, and secure development practices naturally evolved into a strong interest in:

  • Application Security
  • Threat Modeling
  • Detection Engineering
  • Secure SDLC
  • Offensive security fundamentals

I recently defended my engineering thesis on deepfake detection, where I designed and trained neural network models (CNN, LSTM) to detect manipulated video content.

Cybersecurity is not just something I study — it’s the direction I’m actively building my career in.


🏅 Certifications

  • 🛡️ ISC2 Certified in Cybersecurity (CC)
    Issued: 2026

    ISC2 CC

  • 🔐 CompTIA Security+ (in progress)
    Expected: 2026

    CompTIA Security+

  • 🌐 Cisco Networking Academy – Network Security

    Issued: 2025

    Cisco Networking

  • 🌐 Cisco Networking Academy – Enterprise Networking, Security and Automation

    Issued: 2025

    Cisco Enterprise Networking


🔐 What I'm Currently Working On

  • 📚 Preparing for CompTIA Security+
  • 🧠 Expanding hands-on skills on TryHackMe
  • 🛠 Building practical security-focused projects:
    • Secure SDLC demo projects
    • Detection engineering lab
    • Web application security testing reports
  • 🧩 Deepening knowledge of MITRE ATT&CK & threat modeling

🛠 Technical Stack

Security

  • OWASP Top 10
  • SAST (SonarQube)
  • DAST (OWASP ZAP)
  • SIEM (Elasticsearch)
  • IDS (Snort)
  • XDR (Wazuh)
  • MITRE ATT&CK
  • Risk assessment & threat modeling

Engineering

  • Python
  • TypeScript
  • Bash
  • Linux
  • Docker
  • Git
  • Azure Pipelines
  • CI/CD automation

Cloud & Infra

  • AWS (fundamentals)
  • Networking (TCP/IP, protocols)
  • Secure architecture basics

🔎 Areas of Focus

I am particularly interested in:

  • 🔵 Application Security Engineering
  • 🔵 Security Engineering (Detection & Hardening)
  • 🔴 Penetration Testing (long-term growth path)

📂 Featured Projects

🛡️ Threat-detection-and-response

A hands-on network traffic capture and analysis project.
Configured virtual machine environments to generate and analyze traffic, apply IDS signatures, collect logs, and practice detection workflows. Demonstrates practical detection engineering and response fundamentals that mirror real-world security operations.

⭐ Focus: network analysis, rule creation, logging & detection methods.


🔍 Computer-Forensics

Collection of forensic reports and tools used to analyze digital evidence after incidents.
Includes structured write-ups of file system analysis and recovery techniques, showing capability to conduct thorough post-incident reviews and evidence documentation.

⭐ Focus: forensic methodology, data recovery, analytical reporting.


📊 TextMatch

A web application for comparing and analyzing text content.
Although not a traditional security project, this application can be extended with secure coding practices and demonstrates understanding of web application development — a core skill for security engineers.

⭐ Focus: secure web app fundamentals, input validation, data handling.


⚙️ Linux-bash

Shell scripting repository showing advanced command-line knowledge.
Strong shell scripting skills are essential for automation, log parsing, incident response tasks, and building security tooling.

⭐ Focus: Linux scripting, automation, command-line proficiency.


🧠 Playfair_cipher

Implementation of the Playfair cipher in C++ with accompanying CWE analysis.
Includes a study on common weaknesses and exposures (CWE) related to classic ciphers — a good example of security thinking applied to cryptographic concepts.

⭐ Focus: cryptography concepts, static code analysis, CWE awareness.


📫 Connect With Me


"Security is not a checklist — it’s an engineering mindset."

Pinned Loading

  1. Linux-bash Linux-bash Public

    Bash scripting

    Shell

  2. TextMatch TextMatch Public

    Web application to compare text content of files.

    JavaScript

  3. Threat-detection-and-response Threat-detection-and-response Public

    Capturing, generating and analyzing network traffic. Creating rules and collecting logs using tools on virtual machines in Linux environments. Configuring an antivirus tool and scanning for vulnera…

  4. Computer-Forensics Computer-Forensics Public

    Collection of reports on the use of advanced systems for forensic analysis. Full post-hack analysis and the process of acquiring, securing and describing digital evidence. Recovery of deleted data.