all projects

01.

Threat Intelligence

A real time threat intelligence feed that uses on-going attacks to provide IOCs. In the world of Automated SOC with SOAR/XOAR platforms, threat intelligence can provide pro-active prevention of threats provided they are real time. Many threat intelligence today use stale data sources or similar duplicate sources and add to the noise for SOC alerts. Not to mention these create losses to business due to high level of False Positives. Wicked is able to correct this by using 10 years of aggregated intelligence and statistical analysis combined with live traffic to generate IOCs in real time.

threat-intelligencecybersecurityfundingDevSecOps
02.

Deep Learning Portfolio

After 12 years of researching on the subject of capital markets, I tested theories of value investing and technical analysis. Manual trades confirmed a benchmark beating return YoY with extremely low Sharpe Ratio (1.0 in 2020). However the process is currently tedious in investment world and is performed manually by Analysts. This is prone to errors due to our inability to process large amounts of information in a repeatable fashion. After completing my Udacity degree in AI for Trading I have been able to put together a system that efficiently analyses capital markets and recognizes opportunities across multiple markets in a range of investment styles. There is still much work to be done but existing positive returns justify investment. I have completed private seed investment and open to external funding with partnerships for next stage to grow the operation.

Deep LearningSeed fundedFintechInvestment and Fund Management
03.

LinkedIn Data mining

Using LinkedIn data to help recruiters find the ideal candidates. One could apply any number of patterns and rules and let the data mining find the top candidates to reach out to. All one needs is a few basic pieces of information like role and location. The solution is capable of analyzing 1 million profiles in a day given moderate resources. It performs better than linkedin because it matches better based on a proprietary matrix and considering the larger context of career moves between organizations. Not to mention I was able to apply data science and ML to further reduce the noise and surface candidates who may not otherwise even appear in regular searches.

JavaPythonScikit-learnPytorchSpring BootPostgresqlRedisAzureAWS
04.

Secure Application Access and Acceleration

This was a POC project built around 2014 which allows Secure Web access for devices to protect employees from Web attacks and phishing scams. This is also used as secure proxy to access internal application hosted in the Cloud or On-Prem. Unlike other solutions which use their own network, this solution allows you to use your existing Security tools and Cloud resources to deploy and manage all resources. Other perimeter security can still be used as a complimentary solution. The solution integrates with existing XOAR and SIEM tools as well as OSINT out of the box. In addition, I have added support for DNS over Http recently. Within Enterprise environment this also works as AMP which came about much later and is only provided by Google. However any organization can have the same using this S3A which will provide bandwidth and infrastructure savings, additional security and faster application access. Get in touch if your organization would like to invest in this solution for cost-effective Security and access for remote working employees. This project is looking for funding.

CybsecurityRemote AccessSSL ProxyZero trustCloud SecurityNeeds Funding

copyright©2022Singularity.sg all rights reserved.