Cyber Sec
Student
I’m a BSc Cyber Security student with hands on experience in intrusion detection, machine learning, network engineering, and secure software development. I’m passionate about solving real world security issues and I am continuously developing my technical skills.
Years Of
Experience
7 Projects
As a cyber security student, I enjoy turning complex problems into clear, secure solutions via hands on learning and continuous improvement.
Resilient and focused when in work mode.
Continuously working on my craft.
These projects reflect my academic journey in cyber security. It showcases my problem solving skills, technical growth, and my problem solving skills.
The following percentages reflect my current focus areas, showing how I balance skill development, career preparation, and professional growth as a student.
Continuously developing technical skills through university coursework, personal projects, and hands-on practice. This helps strengthen both my theoretical understanding and practical ability.
Working towards securing an entry-level role where I can apply my knowledge in a real-world cyber security environment. This will allow me to gain industry experience and learn from professionals.
Pursuing industry-recognised certifications to strengthen my foundation and support professional growth. These certifications will help validate my skills and improve my employability.
Feedback from colleagues, managers, and lecturers reflecting my work ethic, collaboration skills, and approach to learning in both professional and academic environments.
University Project Teammate
Working with Reigis on our university project was a genuinely positive experience. He consistently took initiative, communicated clearly, and stayed reliable under pressure. His ability to break down problems and stay focused helped keep the team on track, especially during tight deadlines.
Course Colleague
Reigis brings a strong work ethic and a willingness to learn to every project. He’s open to feedback and always looks for ways to improve his technical skills. During group work, he was dependable and contributed thoughtful ideas that strengthened the final outcome.
Logistics Manager, Gather & Gather
Reigis was reliable, organised, and consistently professional while working under pressure. He handled logistical tasks efficiently, followed procedures carefully, and communicated well with both team members and supervisors. His calm approach and strong work ethic made him a dependable part of the operation.
University Lecturer
Reigis demonstrated strong engagement throughout the module and a clear commitment to developing his technical understanding. He approached coursework thoughtfully, showed persistence when solving problems, and applied feedback effectively. His progress reflects a motivated student with clear potential for further growth.
Outside of technology, these interests help me develop a range of transferable skills such as focus, discipline, strategic thinking, and situational awareness. They play an important role in how I manage pressure, maintain consistency, and approach problem solving in both academic and professional settings. Staying informed through podcasts and news supports my awareness of wider industry and global developments, while activities such as football help me maintain balance, resilience, and mental wellbeing alongside my studies and career development in cyber security.
Following cyber, tech, and industry podcasts to stay aware of new threats and trends.
Helps maintain fitness, discipline, and mental balance alongside academic work.
Developing strategic thinking, adaptability, and problem solving in difficult situations.
Staying informed on global events to understand emerging risks and digital impact.
Late in September 2025, Japan’s leading brewer, Asahi Group, became the latest high-profile victim of a cyber-attack that halted large parts of its domestic operations. The incident affected the company’s core digital systems which include order processing, shipment logistics and call centre functions causing widespread disruption in production and distribution across Japan. As a result, major retailers and bars began warning customers that stocks of Asahi’s popular products, such as Super Dry beer and other beverages, could run low or disappear from shelves entirely.
What struck me about this incident is how a single successful breach can ripple outward from digital infrastructure into everyday life and commerce. Despite the attack being confined to internal systems, the effects were tangible: restaurants scrambled for alternative suppliers, convenience stores prepared for shortages, and Asahi was forced to manually process some orders while it worked to restore normal operations.
We are unable to provide a clear timeline for recovery.
Asahi
From a cyber security perspective, the Asahi attack emphasises a few important points. First, even organisations with strong brand recognition and market dominance are not immune to disruption when their IT and operational networks are compromised. Second, it highlights the fragility of digital-first supply chain systems. If the digital backbone fails, the physical outputs (beer on shelves, food and drink distribution, logistics pipelines) suffer almost immediately. Third, the incident serves as a reminder that resilience planning must go beyond basic protection and include robust incident response, contingency operations and clear communication strategies.
In my view, this story isn’t just about beer shortages. It’s a real-world example of how cyber security isn’t abstract or distant, but something that affects everyday products, businesses and people. As industries continue to digitise and interconnect, the Asahi case shows why cyber resilience needs to be a priority at every level from boardrooms to engineers on the ground.
High-profile cyber incidents often feel distant until they affect organisations we interact with daily. The cyber attack on Jaguar Land Rover stood out to me because it highlighted how even well resourced, global companies remain vulnerable to modern threats. As a cyber security student, incidents like this turn theoretical risks into real-world lessons.
From a personal perspective, the JLR attack reinforced why cyber security is no longer just a technical concern, but a critical part of business resilience. The disruption caused by an attack of this scale shows how quickly operations, reputation, and customer trust can be impacted when systems are compromised.
We are considering different stages of a controlled restart of our global operations.
Jaguar Land Rover
The attack reportedly resulted in the temporary shutdown of certain IT systems, affecting internal operations and access to employee platforms. While details were understandably limited, the incident appeared to involve unauthorised access rather than a simple technical failure. This highlights a recurring issue in cyber security: attackers often exploit weaknesses in access control, credentials, or interconnected systems rather than targeting infrastructure directly.
What stood out to me was not the sophistication of the attack itself, but the reminder that complexity can work against organisations. Large enterprises rely on extensive digital ecosystems, making visibility and control increasingly difficult without strong monitoring and detection processes in place.
As someone preparing for a career in cyber security, this incident served as a reminder that defensive measures must evolve alongside threats. Detection, logging, and response capabilities are just as important as perimeter security. Attacks are not always obvious, and without visibility, organisations may not realise the scale of an issue until disruption occurs.
The JLR attack also highlighted the importance of understanding risk from both a technical and organisational viewpoint. Cyber security professionals need to communicate risk clearly, support recovery efforts, and contribute to long term resilience rather than focusing solely on prevention.
Ultimately, this incident reinforced why I am pursuing cyber security as a career path. Real world attacks like this emphasise the need for continuous improvement, practical skills, and a strong understanding of how security decisions affect entire organisations. For me, it was a clear example of how cyber security directly supports operational stability in the modern digital landscape.
Over the past year, I’ve been working on a computer vision based Intrusion Detection System as part of my studies in cyber security and artificial intelligence. The aim of this project was to explore how real time monitoring and automation can be used to detect potential security breaches within defined physical spaces, using CCTV footage rather than traditional sensors alone.
What made this project particularly interesting to me was the opportunity to combine theory with practical implementation. I designed the system to analyse live or recorded video feeds frame by frame, identify human movement within virtual detection zones, and trigger automated alerts when an intrusion is detected. By using Python, OpenCV, and a YOLO-v4-tiny deep learning model, the system is able to balance detection accuracy with performance, making it suitable for real time use on limited hardware.
A key part of the development process involved refining detection boundaries and reducing false positives. I implemented on screen visual alerts, bounding boxes, and confidence scores to clearly show when and why an intrusion was detected. In addition, I added evidence logging and integrated Pushover notifications, allowing alerts to be sent directly to a mobile device. This helped simulate how such a system could be used in real world residential or small commercial environments.
From a cyber security perspective, this project reinforced how important automation and visibility are in modern security operations. Rather than relying solely on manual monitoring, AI assisted surveillance can significantly improve response times and reduce human error. While this system is still a prototype with room for improvement, it demonstrates how computer vision can play a meaningful role alongside traditional security controls.
Overall, building this Intrusion Detection System helped me develop practical skills in computer vision, Python programming, system integration, and security automation. More importantly, it gave me a clearer understanding of how emerging technologies can be applied to real security challenges, which is something I aim to continue exploring as I move forward in my cyber security career.
