Resume
George D. Smith III
Aspiring Penetration Tester | Cybersecurity Student | Home Lab Practitioner
Newport News, VA | trey7868@gmail.com | (757) 839-3592 | GitHub Profile | LinkedIn URL | ePortfolio
Education
Bachelor of Science in Cybersecurity
Old Dominion University—Expected Graduation: December 2026 GPA: 3.49
Honors: Dean’s List, Cybersecurity Scholar
🎓 Relevant Coursework & Training
Ethical Hacking and Penetration Testing
Networked Systems Security
Cyber Techniques and Operations
Introduction to Cybersecurity
Cybersecurity Foundations
Foundations of Data Science
Kali Linux Tutorial for Beginners by Hackers Academy
Complete Ethical Hacking Bootcamp by Andrei Neagoie & Aleksa Tamburkovski
Technical Skill
Operating Systems & Platforms
- Kali Linux, Kali Purple, Parrot OS, Windows 7–11, Windows Server, Android VirtualBox, Proxmox
Security & Offensive Tools
- Metasploit (msfconsole, payload generation), Nmap, Aircrack-ng, RouterSploit, Gophish, Responder, PEASS-ng, GTFOBins (privilege escalation analysis)
Networking & Infrastructure
- TCP/IP, Subnetting, VLANs, NAT, pfSense Virtual network segmentation, firewall rule design Wireshark packet analysis
Programming & Scripting
- Python (security tooling, encryption concepts)
- Bash (Linux automation basics)
- C++ (foundational learning)
- HTML (basic web structure for lab simulations)
Security Concepts
- Penetration testing methodology
- MITRE ATT&CK framework alignment
- Incident response fundamentals
- Log monitoring and analysis
- Red team vs. blue team operations
Cybersecurity Projects
Home Lab Architect & Operator—Self-directed (2024–Present)
- Designed and maintained a multi-subnet virtual cybersecurity lab supporting offensive and defensive simulations
- Implemented network segmentation using pfSense, including firewall rules, NAT, and traffic isolation
- Deployed Kali Linux (Red Team) and Kali Purple (Blue Team) to simulate attacks and monitor detections
- Integrated Windows Server (Active Directory) to explore misconfigurations, privilege escalation paths, and logging
- Practiced log analysis and incident visibility to understand defender perspectives during attacks
Credential Capture Site Simulation
- Deployed a phishing simulation using a fake HTTP site with Apache on Kali Linux
Certifications (In Progress)
CompTIA Security+ (SY0-701) – Target Completion: January 29, 2026
Certified Ethical Hacker (CEH) – Target Completion: August 2026
Hands-On Lab Experience
Ethical Hacking Course Lab
- Conducted penetration testing simulations and documented vulnerabilities
- Gained hands-on experience with reconnaissance tools and wireless security testing
Cyber Techniques & Operation Course
- Practiced offensive and defensive techniques, threat modeling, and vulnerability scanning
- Learned fundamentals of managing security incidents and reporting technical findings
Additional Information
U.S. Citizen
Full-time student with completed freshman year Able to commit to 30+ hours/week
Strong interest in penetration testing, information security, and networking rotations
Transcript available upon request or upload