Resume
George D. Smith III
Security+ Certified | Entry-Level Cybersecurity Candidate | Blue & Red Team Foundations | Windows & Linux Security
Newport News, VA | georged.smith4@gmail.com | (757) 839-3592 | GitHub Profile | LinkedIn URL | ePortfolio
Cybersecurity student with hands-on experience configuring, hardening, testing, and analyzing systems across Windows, Linux, and networked environments. Operates a multi-subnet home lab to simulate real-world red and blue team scenarios, focusing on firewall design, Active Directory security, logging visibility, and controlled penetration testing. Approaches security work with an emphasis on scope, documentation, and understanding both attacker behavior and defensive impact.
Education
Bachelor of Science in Cybersecurity
Old Dominion University — Norfolk, VA
- Expected Graduation: December 2026
- GPA: 3.53
Honors:
- Dean’s List (2023–Present)
- Cybersecurity Scholar
- ODU CyberOps CTF Participant (2024–2026)
- Mid-Atlantic Collegiate Cyber Defense Competition Participant (2026)
- VMI CyberFusion Competition Participant (2026)
- CNU CyberForge Participant (2026)
- UMGC’s MACCDC HTB CTF 3rd Place Team (2026)
Certifications
CompTIA Security+ (SY0-701) – Credential ID: f35f2fe77b4f401ab826b641bafc0b8b
Offensive Security Certified Professional (OSCP) — In Progress (July 2026)
CompTIA CySA+ — In Progress (December 2026)
Technical Skills
Programming: Python, Bash, PowerShell, C++ (foundational)
Operating Systems: Windows 7–11, Windows Server 2025, Kali Linux, Kali Purple, Ubuntu Linux, Metasploitable
Security Tools:
Nmap, Metasploit, Wireshark, Burp Suite, Aircrack-ng, SEToolKit, Gophish, RouterSploit, Wazuh, Security Onion, Fail2ban
Networking:
TCP/IP, Subnetting, VLANs, NAT, Firewall Configuration, Network Segmentation
Security Concepts
• Penetration Testing Methodology (MITRE ATT&CK)
• Incident Response Fundamentals
• Log Analysis & SIEM Monitoring
• Red Team vs Blue Team Operations
Cybersecurity Projects
Home Lab Architect & Operator (2024–Present)
Designed and maintained a multi-subnet virtual cybersecurity lab simulating real-world red and blue team operations.
• Built segmented networks using OPNSense with firewall rules, NAT, and traffic isolation
• Deployed Windows Server (Active Directory) to test privilege escalation and misconfigurations
• Integrated Wazuh SIEM for log monitoring and detection analysis across endpoints
• Used Security Onion for network-based monitoring and traffic analysis on isolated subnets
• Simulated attacks using Kali Linux and analyzed detection visibility from the defender’s perspective
Penetration Testing & Offensive Security Practice
Performed controlled penetration testing in lab environments using industry tools.
• Conducted enumeration and exploitation using Nmap and Metasploit
• Practiced privilege escalation and post-exploitation techniques
• Used RouterSploit for embedded device testing
• Simulated phishing campaigns using Gophish and SEToolKit
Penetration Testing Documentation & Analysis (In Progress)
Developed structured documentation of penetration testing activities within a controlled lab environment.
• Recorded reconnaissance, enumeration, and exploitation attempts across multiple target systems
• Analyzed scan results, service behavior, and vulnerabilities identified during testing
• Organized findings into a structured format aligned with penetration testing methodologies
• Built reports that translate technical findings into clear security insights