
Project Overview
Since 2018, I have been responsible for designing, implementing, and maintaining the IT infrastructure and cybersecurity operations of FillianaCare. Beyond the corporate website, this project covers the full internal systems architecture, user management, security hardening, and continuous monitoring of both on-premise and online services.
The goal was to build a secure, scalable, and well-structured IT environment that supports daily operations while protecting sensitive company data and digital assets.
Scope of Work
System Administration & Infrastructure Design
Identity & Access Management
Network Security & Firewall Configuration
Endpoint Monitoring & Incident Response
Long-term IT & Security Roadmap Execution
Infrastructure & Systems Implemented
Windows Server Environment
Active Directory (AD)
Remote Desktop Services (RDS)
File Server with role-based access control
User & Permission Management
Department-based folder and file access
Secure authentication and controlled privileges
Network Security
Firewall configuration and custom security rules
Secure internal and external access policies
Virtualization
Dedicated Virtual Machine hosting Wazuh Manager

Cybersecurity Monitoring & Protection
Deployment of Wazuh Manager on a virtual machine
Installation of Wazuh agents on all employee endpoints
Centralized log collection and basic security monitoring
Continuous visibility into system activity and anomalies
Role & Responsibilities
Acting as System Administrator
Designing and executing IT & Security roadmaps
Maintaining infrastructure, users, and access policies
Monitoring systems and responding to security incidents
Supporting the company’s overall digital and online strategy
Business Value
Secure and organized internal IT environment
Protection against real-world cyber threats
Reduced operational risk
Improved visibility and control over systems and users
Long-term, stable IT foundation supporting business growth
Real-World Security Incident (True Case)
Approximately back in November of 2025, abnormal activity was detected targeting the company’s online services, originating from China, Singapore, and Brazil.
What Happened
Automated bots attempted brute-force attacks against a public service offered on the website
Suspicious behavior was identified through log analysis and monitoring data
Response & Resolution
Incident investigation using collected logs and alerts
Identification of the vulnerable service
Immediate mitigation of the vulnerability
Blocking of all malicious IP addresses through the Web Application Firewall (WAF)
Restoration of secure operation with no service disruption
This incident validated the importance of monitoring, logging, and layered security controls already in place.