Essential Work Habits
- Detail-oriented & methodical – Documented and validated remediation for 12+ vulnerabilities during penetration testing labs using Kali Linux and Wireshark.
- Analytical problem solver – Investigated systems from both attacker and defender perspectives to strengthen security posture.
- Adaptable learner – Built and managed 6+ virtual machines simulating enterprise environments (VMware, VirtualBox).
- Collaborative – Worked in team labs designing segmented, multi-subnet networks.
- Current with threats & standards – Knowledge of NIST frameworks, risk mitigation, and threat analysis (Security+ & CySA+).
- Reliable and results-driven – Balanced labs, certifications, internship, and coursework while maintaining a 3.8 GPA.
Artifacts: Pen test reports, VM builds, Wireshark analysis, internship policy work.
Assignment-3-Sword-vs.-Shield-Fall2024-1-1-1Soft Skills
- Technical communication – Wrote reports explaining vulnerabilities, risk, and remediation in clear, structured language.
- Presentation skills – Delivered coursework presentations on cybersecurity strategy and policy frameworks.
- Explaining complex topics – Translated technical findings into practical security improvements.
- Active listening & professionalism – Customer-facing experience handling high-volume interactions with accuracy and composure.
- Team collaboration – Coordinated with peers in labs to complete network and security projects.
Artifacts: Presentation slides, written lab reports, strategy papers.
SCADA-Write-Up-2-1Solid Technical Foundation
- Operating Systems & Virtualization – Linux hardening, system permissions, firewall rules, VMware & VirtualBox environments.
- Networking – Multi-subnet network design, router/switch configuration, traffic analysis with Wireshark.
- Security Tools – Kali Linux, Nmap, Metasploit, vulnerability scanning and validation.
- System Hardening – Patch verification, access control, and secure configuration practices.
- Architecture Awareness – Built simulated production-style environments with servers and endpoints.
Artifacts: Network diagrams, Linux configs, lab screenshots.
Module-5-Lab-1Detailed Knowledge of Key Technologies
- Linux Systems – Server configuration, permissions, updates, firewall setup
- Microsoft Technologies – Active Directory concepts, Windows networking
- Open Source Security Tools – Kali Linux, Wireshark, Nmap, Metasploit
- Network Implementation & Security – Segmentation, traffic flow validation, vulnerability assessment
- Web & Database Environments – Exposure through virtual lab server setups
- Development/Scripting Exposure – Command-line scripting and tool-based automation
- Security Operations Concepts – Threat analysis, incident response fundamentals (CySA+)
- Social Engineering & Physical Security – Understanding of human and layered security risks
Artifacts: Tool outputs, vulnerability reports, lab environment builds.
SOC-Automation-Project-Google-DocsSOC-Automation-Project-Google-Doc2