Enterprise Automation & R&D

I am an EngTech (MBCS) Security Automation Engineer who builds the technological exoskeletons that allow enterprises to scale. I transform complex vulnerability data into actionable insights, eliminating manual overhead and accelerating revenue delivery.

Applied AI, Data Sovereignty & R&D

I have always made AI solutions for clients, that lack secure internal alternatives—creating a massive 'Shadow AI' risk where proprietary data leaks into public models. I architect closed-loop, on-premise AI nodes that sit on local hardware, trained solely on internal data, guaranteeing zero cloud-latency and absolute data sovereignty.

Project HAL / Mona v3

Local Multimodal Agentic AI

Live Asset
PythonLocal LLMsOBS WebsocketNvidia Audio2Face

Originally built to help streamers by reading Twitch/YouTube chat and donations, taking that data through OpenAI APIs and 11Labs for voice synthesis, and generating facial movements via Nvidia Audio2Face piped into OBS.

The V3 upgrade re-architected this entirely for local execution. I completely removed the need for Cloud LLMs and external APIs. I also gave the AI 'eyes', allowing it to see the screen and react dynamically to real-time gameplay.

Business Value / ROI:

  • Zero Ongoing Costs: Local inference eliminates API billing.
  • Complete Data Privacy: Chat logs and interactions never leave the local machine.
  • Proven Adoption: Tool is currently deployed and used by multiple active streamers.

Project ISAC v2.0

Decentralized Predictive Ecosystem

Live Asset
Home AssistantLoRa MeshBiometricsHardware Dev

What began as a standalone "brick" sensor (detecting CO2, VOCs, PM2.5, Lux, and Noise) has evolved into a full-scale prediction engine orchestrating my entire environment.

Built on a Home Assistant backend, ISAC now ingests data from room sensors, mobile devices, and active biometric hardware to predict environmental shifts and health impacts before they occur.

Enterprise-Grade Resilience:

  • Off-Grid LoRa Failover: Deployed mobile nodes at off-site locations. If the main server drops, the system auto-fails over via LoRa, requiring zero cellular/WiFi reliance.
  • Encrypted Communications: P2P secure chat system functioning across the mesh network between users and portable "brick" nodes.
  • Physical Security: Integrates physical intrusion detection into a custom, tablet-deployed SHD UI.

*A proven blueprint for deploying zero-trust, off-grid predictive monitoring systems scalable to Enterprise Security Operations.*

Data Pipelines & Business Augmentation

I do not just write code; I engineer "connective tissue" between enterprise business platforms and deep-technical security tools. I build the custom tooling that eliminates monotony, reduces human error, and allows highly-paid technical staff to focus on actual engineering.

Operational Scale

45,000+

Tasks Automated

Reporting Velocity

~6,000

Docs Processed

Asset Repository

24

Deployed Architectures

Commercial Impact

£xxxk+

Pipeline Supported

Nexus Platform Modernization

Enterprise Core Engine

Lead maintainer responsible for migrating and modernizing the core PHPWord-based reporting engine, managing 190+ deployments. Standardizes deliverables across the entire Pentest department, drastically reducing QA kickbacks and formatting errors.

Sales-to-Delivery Lifecycle

Cross-Platform Orchestration

Architected the operational control plane utilizing Zapier and Power Automate to seamlessly sync CRM data (HubSpot/Salesforce) directly into technical production boards (Trello), enabling auto-contracting and frictionless handover from Sales to Tech.

Engineering Repository (Parsing & Operations)

Core Parsers & Reporting Engines (Data Normalization)

projectTOP

A sophisticated Docx/XML engine using advanced Regex to parse OS-specific patches (ELSA, RHSA) directly into automated report templates, saving hours of manual data entry.

NessusJennius-v2

Full PyQt5 desktop suite for rapid vulnerability analysis. Features automated Chardet encoding detection to prevent pipeline crashes on bad data.

ReportExcelerator

Instantly extracts unstructured vulnerability data from legacy DOCX files and normalizes it into structured Excel datasets for immediate analysis.

Triv-Excel-ate

Processes massive directories of JSON vulnerability scans (Trivy/Nessus), aggressively removes duplicates, and exports perfectly sorted Excel sheets.

SpecialIterrimBee

Complex parser utilizing logic flags to forcefully extract unstructured Issue Titles and Recommendations into a unified structured database.

CisSorter

Automatically extracts CIS compliance failures and maps them to required remediations, turning overwhelming compliance data into a clear checklist.

Custom Bots & Operations Infrastructure

Nessus ResetBot

Selenium-based Slack bot executing remote Nessus license activations via API, eliminating IT bottleneck delays.

Evidence Annotator

Multi-threaded GUI (pynput/Pillow). Accelerates reporting via rapid, dynamic screenshot capture and red-teaming annotation.

SlackGrimReaper

Administrative utility for enterprise workspace hygiene; aggressively audits channel metadata to optimize environment noise.

ProjectAuto & PMOTool

Standardized operational management tools automating project approvals and generating immutable audit logs.

Security Operations & Encrypted Delivery

As a Certified Ethical Hacker (CEH), I approach problem-solving the way a diagnostician approaches a complex case: observe the system, trace the data, and investigate until the system makes sense. I engineer solutions that protect the data supply chain and drastically reduce threat vectors.

Proactive Incident Response

Supply Chain Attack Prevention

Because I monitor automation flows with curiosity rather than assumption, I identified an anomaly in a third-party service integration within ~1 hour. I disabled the integration before the provider even announced the breach, preventing exposure across 8,000+ monthly automation cycles and avoiding massive reputational damage.

Operational Mindset

Neurodiversity as an Asset

Being autistic has shaped how I work in a strictly positive way. In a field fought in the digital realm, my ability to hyperfocus, my attention to detail, and my pattern recognition skills are distinct tactical advantages for identifying vulnerabilities and tracing complex data anomalies that others often miss.

Engineering Repository (Security & Delivery)

Intel, Reconnaissance & Safe Delivery

Secure Twilio v2

OOB (Out-of-Band) delivery system using `pyminizip` to establish a secure, encrypted archive creation pipeline before SMS transmission, guaranteeing client data safety.

Kafka Event Producer

Asynchronous data producer using `confluent_kafka` with rigorous delivery report callbacks to ensure 100% message integrity across operational logging streams.

ShowDan Intelligence

Shodan API parser utilizing `Click` for rapid CLI interaction. Instantly normalizes messy JSON intelligence into highly targeted, actionable attack lists.

ReconRover

Automated reconnaissance asset leveraging Nmap and Requests APIs. Autonomously scans ports, rips headers, and checks for XST vulnerabilities.

Secure Report Sender / MAilMail

Mitigates interception risks by utilizing `pyzipper` for password-protecting ZIP attachments, dispatching them via an automated, authenticated SMTP delivery workflow.

Encripted & IpFinder

GUI-based utilities for rapid AES report encryption, alongside a logic engine designed for instant IP subnet expansion and CIDR sorting.

Business Impact Endorsements

"

"Jenn has developed a powerful suite of automations that meaningfully improves our sales process. These automations save significant time, allowing the team to focus on identifying and closing new business. Given the constantly evolving and complex nature of penetration testing, the automations Jenn designs and maintains help every part of the organisation adapt seamlessly..."

Tom

Head of Sales

"

"The speed and flexibility of her work prove Jennifer's devotion to creating software that streamlines workflow. I have used numerous tools of hers and have been met with no bugs or errors. This shows the experience she has with software creation."

Emily

Pentester

"

"Jenn consistently demonstrates a strong sense of integrity and professionalism. She provides clear technical requirements, produces valuable demos/code, and is helpful, approachable and reliable — willing to assist whenever needed, even when engagement is intermittent or reliant on wider priorities."

Rachel

Director of Advisory Services