George D. Smith III

Security+ Certified | Entry-Level Cybersecurity Candidate | Blue & Red Team Foundations | Windows & Linux Security

Newport News, VA | georged.smith4@gmail.com | (757) 839-3592 | GitHub Profile | LinkedIn URL | ePortfolio

Cybersecurity student with hands-on experience configuring, hardening, testing, and analyzing systems across Windows, Linux, and networked environments. Operates a multi-subnet home lab to simulate real-world red and blue team scenarios, focusing on firewall design, Active Directory security, logging visibility, and controlled penetration testing. Approaches security work with an emphasis on scope, documentation, and understanding both attacker behavior and defensive impact.

Education

Bachelor of Science in Cybersecurity

Old Dominion University — Norfolk, VA

  • Expected Graduation: December 2026
  • GPA: 3.53

Honors:

  • Dean’s List (2023–Present)
  • Cybersecurity Scholar
  • ODU CyberOps CTF Participant (2024–2026)
  • Mid-Atlantic Collegiate Cyber Defense Competition Participant (2026)
  • VMI CyberFusion Competition Participant (2026)
  • CNU CyberForge Participant (2026)
  • UMGC’s MACCDC HTB CTF 3rd Place Team (2026)

Certifications

CompTIA Security+ (SY0-701) – Credential ID:  f35f2fe77b4f401ab826b641bafc0b8b

Offensive Security Certified Professional (OSCP) — In Progress (July 2026)

CompTIA CySA+ — In Progress (December 2026)


Technical Skills

Programming: Python, Bash, PowerShell, C++ (foundational)

Operating Systems: Windows 7–11, Windows Server 2025, Kali Linux, Kali Purple, Ubuntu Linux, Metasploitable

Security Tools:
Nmap, Metasploit, Wireshark, Burp Suite, Aircrack-ng, SEToolKit, Gophish, RouterSploit, Wazuh, Security Onion, Fail2ban

Networking:
TCP/IP, Subnetting, VLANs, NAT, Firewall Configuration, Network Segmentation


Security Concepts

• Penetration Testing Methodology (MITRE ATT&CK)
• Incident Response Fundamentals
• Log Analysis & SIEM Monitoring
• Red Team vs Blue Team Operations


Cybersecurity Projects

Home Lab Architect & Operator (2024–Present)
Designed and maintained a multi-subnet virtual cybersecurity lab simulating real-world red and blue team operations.
• Built segmented networks using OPNSense with firewall rules, NAT, and traffic isolation
• Deployed Windows Server (Active Directory) to test privilege escalation and misconfigurations
• Integrated Wazuh SIEM for log monitoring and detection analysis across endpoints
• Used Security Onion for network-based monitoring and traffic analysis on isolated subnets
• Simulated attacks using Kali Linux and analyzed detection visibility from the defender’s perspective


Penetration Testing & Offensive Security Practice
Performed controlled penetration testing in lab environments using industry tools.
• Conducted enumeration and exploitation using Nmap and Metasploit
• Practiced privilege escalation and post-exploitation techniques
• Used RouterSploit for embedded device testing
• Simulated phishing campaigns using Gophish and SEToolKit


Penetration Testing Documentation & Analysis (In Progress)
Developed structured documentation of penetration testing activities within a controlled lab environment.
• Recorded reconnaissance, enumeration, and exploitation attempts across multiple target systems
• Analyzed scan results, service behavior, and vulnerabilities identified during testing
• Organized findings into a structured format aligned with penetration testing methodologies
• Built reports that translate technical findings into clear security insights