RAYYAN-NET // SECURITY INTERFACE v2.4
INITIALIZING AUTHENTICATION MODULE...
VERIFYING CREDENTIALS
LOADING...
SCANNING...
Available  ·  Canada  ·  Open to hybrid & full-time

Rayyan Umair

IT Support & Cybersecurity Building toward Security Architecture & AI-Augmented Defense

"Technology evolves quickly. Responsibility does not."

2+Years hands-on
4Active certs
21Years old
T1/T2Support & SecOps
scroll ↓
01 / About

Curious by default. Security by design.

I'm young. I didn't get here through a straight line, and I think that's actually the point.

Growing up, I bounced between three different worlds out of pure curiosity: medicine, engineering, and eventually technology. Nobody mapped that out for me. I just couldn't help wanting to understand how things worked and, more importantly, why they failed. That instinct never switched off.

7
years of conscious learning across medicine, engineering, and IT before most people my age figured out what they wanted to do with one. Not formal degrees across all three. Just the kind of self-directed obsession that follows you past school hours and into every rabbit hole you can find.

What each field gave me was different. Medicine showed me that the gap between a system functioning and a system failing is almost always smaller than it looks from the outside. Engineering taught me to think in structures: what depends on what, what carries the load, what happens when one piece doesn't hold. When I found IT, both of those instincts finally had somewhere useful to go.

AI pulled me in first. I was fascinated by systems that could find patterns in data and make decisions faster than any human team. But I kept arriving at the same uncomfortable question: what happens when the pattern is wrong? Who catches it? Who's responsible? That question is what led me into security. Not as a pivot, but as the natural next step.

I don't just want to fix problems. I want to build systems where the problems are structurally harder to create in the first place.

I know I'm early. I'm not pretending otherwise. But with two years of hands-on experience, four active certifications, and a degree in information security underway, I'm building toward something deliberate: security architecture at the intersection of AI, risk, and human judgment.

Security Architecture & Risk
Design systems that hold up by principle, not ones that survive because someone remembered to patch them in time.
AI-Augmented Decision Making
AI handles execution well. Judgment calls in ambiguous situations with real consequences - that boundary needs a human in the right seat.
Human Accountability in Systems
When something goes wrong at scale, someone has to walk into that room, own it, and make it credible it won't happen again. That's the role I'm working toward.
02 / Experience

Where I've worked.

03 / Skills & Tools

What I bring.

Tools & Technologies
04 / Education & Certifications

Education

Certifications

05 / Projects

Things I've built.

Flagship Project
NetRaptor
Integrated Network Intelligence & Threat Hunting System

NetRaptor is an active development project - a modular, offensive-security-grade network intelligence platform built from the ground up. The concept: a unified system that doesn't just observe a network, it understands it. Combines real-time scanning, packet-level analysis, threat correlation, and automated incident response into a single cohesive engine.

The architecture is designed around the idea that every tool should feed every other tool. Scanner output feeds the threat mapper. Log analysis informs the SIEM simulator. Incident response draws from everything. No siloed dashboards - one predator-instinct system.

  • Network-wide host discovery and port enumeration (NetSweep - covers both recon layers)
  • Deep packet capture and protocol dissection (PacketStrike)
  • DNS monitoring and anomaly flagging (DNSTalon)
  • Multi-source log parsing with Windows Event Log mode (LogClaw - unified with WhoKnocks)
  • SIEM simulation with integrated Sigma rule engine (SIEMulate + SigmaParser - one system)
  • Threat mapping and IOC correlation (ThreatMapper)
  • CVE lookup and vulnerability correlation (CVECheck)
  • Incident response and attack timeline reconstruction (TalonResponse + StrikeMap - unified IR tool)
8
Integrated Tools
3
Tool Clusters
Modular Expansion
0
Dependencies on SaaS
● Active Development
Architecture defined. Core modules in development. No external links yet - building in private.
Python Scapy Nmap API Sigma Rules SQLite REST API Linux MITRE ATT&CK
Tools in Development
The NetRaptor ecosystem - 8 tools across 3 clusters.
CTF & Hackathons
In Progress

Active practice on HackTheBox and TryHackMe. Every room documented - methodology, dead ends, and lessons, not just solutions.

Overall ProgressActive
HackTheBox TryHackMe Writeups Active
Writeups being added actively. Hackathon entries being sourced. Check back - this section grows with every room completed.
Academic Projects
hover to expand ◆

Graded, documented, and deployed. Built across two programs - networking, embedded systems, security, and ITSM. Hover the card to see the network.

    Portfolio Website
    Live
    This site. Built from scratch - no frameworks, no templates. The globe, the animations, the boot sequence, the node systems - all handwritten because full control over how it feels matters.
    Zero dependencies. The architecture is the portfolio.
    HTML5CSS3Vanilla JSCanvas APIGitHub Pages
    06 / Contact

    Let's talk.

    I'm open to full-time and hybrid roles in IT support, cybersecurity, and security operations. If you need someone who thinks in systems and stays in the room when things get hard, reach out.

    Languages: English Urdu Punjabi