Skills & Artifacts Page

Skill 1: Cybersecurity Technical Skills (Threat Analysis & Network Security)

Description: Understanding threats, vulnerabilities, and basic defense methods.
Why it works: Every job ad for cybersecurity wants threat awareness, logs analysis, and understanding of cyberattacks.

Artifact 1 – Network Security Assignment

  • This was a basic network configuration/security project

Artifact 2 – NIST or Cybersecurity Framework Summary

  • CIA Triad Report

Artifact 3 – Cybertrespass Research Paper

Skill 2: Digital Forensics & Analytical Problem-Solving

Description: Ability to analyze logs, incidents, systems, and digital evidence.
Why it works: Employers look for investigation skills, even at entry level.

Artifact 1 – Log Analysis Practice

  • During this log analysis practice, I identified several suspicious activities: Multiple failed logins in a short time (potential password-guessing). Repeated login failures from an external IP attempting to access the admin account (possible brute-force attack). Log deletion following a successful login, which could indicate an attempt to cover tracks. This exercise demonstrates my ability to read system logs, recognize abnormal behavior, and identify early warning signs of unauthorized access.
  • Sample system logs:
  • 2025-01-12 08:15:43 LOGIN SUCCESS user=agomez ip=192.168.1.24
  • 2025-01-12 08:17:10 FILE ACCESS user=agomez file=/docs/final_paper.docx
  • 2025-01-12 09:42:55 LOGIN FAILED user=agomez ip=192.168.1.24
  • 2025-01-12 09:43:01 LOGIN FAILED user=agomez ip=192.168.1.24
  • 2025-01-12 10:02:18 LOGIN FAILED user=admin ip=185.243.11.92
  • 2025-01-12 10:02:22 LOGIN FAILED user=admin ip=185.243.11.92
  • 2025-01-12 10:02:29 LOGIN FAILED user=admin ip=185.243.11.92
  • 2025-01-12 10:15:40 LOGIN SUCCESS user=agomez ip=192.168.1.24
  • 2025-01-12 10:17:09 FILE DELETE user=agomez file=/logs/error_temp.log
  • 2025-01-12 11:55:41 LOGIN FAILED user=admin ip=185.243.11.92

Artifact 2 – Case Study

  • write-up about SCADA Systems and explaining the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.

Artifact 3 – SQL / Database Project

  • Develop a Conceptual Model of database for Asante, LLC, and transform it to a Relational Model (ERD).

Skill 3: Secure Systems & Policy/Compliance Knowledge

Description: Understanding rules, procedures, access control, and cyber policies.
Why it works: A lot of cybersecurity work involves compliance, auditing, and policies.

Artifact 1 – Security Policy or Risk Assessment Paper

  • analysis of the social meaning and impact of cybersecurity-related technical systems.

Artifact 2 – Access Control or Authentication Assignment

  • human element is a critical component of cybersecurity

Artifact 3 – Interdisciplinary Project Showing Cyber Ethics