Skills

Essential Work Habits

  • Detail-oriented & methodical – Documented and validated remediation for 12+ vulnerabilities during penetration testing labs using Kali Linux and Wireshark.
  • Analytical problem solver – Investigated systems from both attacker and defender perspectives to strengthen security posture.
  • Adaptable learner – Built and managed 6+ virtual machines simulating enterprise environments (VMware, VirtualBox).
  • Collaborative – Worked in team labs designing segmented, multi-subnet networks.
  • Current with threats & standards – Knowledge of NIST frameworks, risk mitigation, and threat analysis (Security+ & CySA+).
  • Reliable and results-driven – Balanced labs, certifications, internship, and coursework while maintaining a 3.8 GPA.

Artifacts: Pen test reports, VM builds, Wireshark analysis, internship policy work.

Assignment-3-Sword-vs.-Shield-Fall2024-1-1-1


Soft Skills

  • Technical communication – Wrote reports explaining vulnerabilities, risk, and remediation in clear, structured language.
  • Presentation skills – Delivered coursework presentations on cybersecurity strategy and policy frameworks.
  • Explaining complex topics – Translated technical findings into practical security improvements.
  • Active listening & professionalism – Customer-facing experience handling high-volume interactions with accuracy and composure.
  • Team collaboration – Coordinated with peers in labs to complete network and security projects.

Artifacts: Presentation slides, written lab reports, strategy papers.

SCADA-Write-Up-2-1


Solid Technical Foundation

  • Operating Systems & Virtualization – Linux hardening, system permissions, firewall rules, VMware & VirtualBox environments.
  • Networking – Multi-subnet network design, router/switch configuration, traffic analysis with Wireshark.
  • Security Tools – Kali Linux, Nmap, Metasploit, vulnerability scanning and validation.
  • System Hardening – Patch verification, access control, and secure configuration practices.
  • Architecture Awareness – Built simulated production-style environments with servers and endpoints.

Artifacts: Network diagrams, Linux configs, lab screenshots.

Module-5-Lab-1


Detailed Knowledge of Key Technologies

  • Linux Systems – Server configuration, permissions, updates, firewall setup
  • Microsoft Technologies – Active Directory concepts, Windows networking
  • Open Source Security Tools – Kali Linux, Wireshark, Nmap, Metasploit
  • Network Implementation & Security – Segmentation, traffic flow validation, vulnerability assessment
  • Web & Database Environments – Exposure through virtual lab server setups
  • Development/Scripting Exposure – Command-line scripting and tool-based automation
  • Security Operations Concepts – Threat analysis, incident response fundamentals (CySA+)
  • Social Engineering & Physical Security – Understanding of human and layered security risks

Artifacts: Tool outputs, vulnerability reports, lab environment builds.

SOC-Automation-Project-Google-Docs

SOC-Automation-Project-Google-Doc2