An Icon with custom HTML
Wide Page with Large HTML Objects
This page uses a custom wide container instead of Blowfish’s default narrow column. Since no background or fixed colors are set, Blowfish’s dark/light theme styles will automatically apply.
Wide Test Table
| Column A | Column B | Column C | Column D |
|---|---|---|---|
| Row 1, Cell A | Row 1, Cell B | Row 1, Cell C | Row 1, Cell D |
| Row 2, Cell A | Row 2, Cell B | Row 2, Cell C | Row 2, Cell D |
| Merged Cell Spanning All Columns | |||
Code Example
#!/bin/bash
# Wide Sample Bash Script
for i in {1..20}; do
echo "Count: $i"
sleep 0.5
done
Embedded Video
Long List
- Item 1 - Long descriptive text goes here
- Item 2 - Another extended entry with more details
- Item 3 - Testing multi-line wrapping in lists
- Item 4 - Even more content to stretch the layout
- Item 5 - Large list item with additional notes
- Item 6 - Extra filler item for scrolling tests
- Item 7 - More wide rendering checks
ffff Controls implemented using technology. - Examples: Firewalls, antivirus software, system policies within operating systems.
-
Managerial:
- Policies and procedures for managing security.
- Examples: Security policy documentation, onboarding policies, compliance procedures.
-
Operational:
- Controls relying on human interaction and processes.
- Examples: Security guards, awareness training, reception desks.
-
Physical:
- Measures restricting physical access.
- Examples: Guard shacks, badge readers, fences, locks.
Control Types #

-
Preventive:
- Stops events from happening.
- Examples:
- Technical: Firewall rules.
- Managerial: Onboarding policies.
- Operational: Guard shack ID checks.
- Physical: Door locks.
-
Deterrent:
- Discourages malicious activity.
- Examples:
- Technical: Security splash screens.
- Managerial: Threat of demotion for violations.
- Operational: Reception desk monitoring.
- Physical: Warning signs.
-
Detective:
- Identifies and warns about events.
- Examples:
- Technical: System logs and login reports.
- Managerial: Log review policies.
- Operational: Patrolling security guards.
- Physical: Motion detectors.
-
Corrective:
- Responds to and mitigates damage from incidents.
- Examples:
- Technical: System backups and restorations.
- Managerial: Policies for issue reporting.
- Operational: Contacting authorities.
- Physical: Fire extinguishers.
-
Compensating:
- Provides temporary or alternative solutions when primary controls fail.
- Examples:
- Technical: Firewall rules instead of software patches.
- Managerial: Separation of duties.
- Operational: Multiple security guards working concurrently.
- Physical: Power generators for outages.
-
Directive:
- Provides guidance or instructions for secure practices.
- Examples:
- Technical: File storage policies for sensitive data.
- Managerial: Compliance and procedural documentation.
- Operational: Security training courses.
- Physical: Signs stating “authorized personnel only.
-
Senior Machine Learning Engineer
Jun 2022 – Present
Analysing sidescan sonar data and GAN based image simulation
- Project managed and mentored 2 interns for an **augmented reality** mission planning tool. - Developed a **custom MLflow server** for reproducibility of ML experiments. - Ownership of internal sidescan sonar simulation codebases. - Maintained internal ML dependencies (e.g., **CUDA**). -
Machine Learning Engineer
2020 – 2022
Sidescan sonar image synthesis with GANs
- Developed custom **generative adversarial network (GAN)** solutions for sonar image simulation. - Integrated CUDA-accelerated training pipelines. -
Education
2015 – 2019
B.Sc. in Computer Science
- Specialized in machine learning and computer vision. - Published undergraduate thesis on **signal processing for sonar imaging**.