Skills
Essential Work Habits
- Eager to dig into technical questions and examine them from all sides
- Enthusiastic and highly adaptable
- Strong analytical and diagnostic skills
- Keep a current understanding of vulnerabilities from the Internet
- Maintaining awareness and knowledge of contemporary standards, practices, procedures and methods
- Ability to get the job done
Soft Skills
- Excellent presentation and communications skills to effectively communicate with management and customers
- Excellent problem-solving skills with extreme persistence.
- Ability to clearly articulate complex concepts both written and verbally
- Ability, understanding, and usage of active listening skills especially with customers
Feedback Highlights
- “Overall well written and developed. Great points discussing the social factors and implications influencing the Network Security Policy.” – Skip Hiser
- “Overall well written and developed. I especially liked the use of examples to emphasize your points. Also, good job highlighting the various aspects of protecting critical infrastructure.” – Skip Hiser
- “Excellent Job on Homework 5!! Very detailed answers. Keep up the good work and keep being great!!!” – Malik Gladden
Solid Technical Foundation
- Understand architecture, administration, and management of operating systems, networking, and virtualization software
- General programming/software development concepts and software analytical skills
- Understanding of how the different type of firewalls and network load balancers work
- Deep understanding of how network routers and switches work
- Evaluate and design systems and network architectures
Detailed Knowledge of Key Technologies
- Open Source Applications
- Created a fully isolated homelab environment using open-source tools including OPNsense, Security Onion, and OpenVPN. Configured these systems to simulate real-world network defenses, monitor traffic, and manage secure remote access.
- Linux Operating Systems
- Regularly work with Linux distributions used in cybersecurity, including Kali Linux, Kali Purple, and Parrot OS for penetration testing workflows. Use Linux Mint for daily tasks and advanced command-line practice to strengthen Linux fundamentals.
- Microsoft Technologies
- Deployed and configured multiple Windows environments (Windows 7–11) for vulnerability testing and blue team monitoring. Currently implementing Windows Server 2025 in my homelab for Active Directory, domain management, and enterprise-level security practice.
- Wireless Technologies
- Configured an OpenVPN service using EasyRSA to create secure certificate-based authentication. Conducted wireless security testing using tools such as Aircrack-ng, Wireshark, and hardware like the Flipper Zero to analyze Wi-Fi vulnerabilities and test wireless attack simulations in a controlled environment.
- Web Application Technologies
- Performed hands-on testing of web application vulnerabilities using tools such as Burp Suite and custom Apache hosts.
- Compiled and Interpreted Development Languages
- Experience with interpreted languages such as Python for automation, encryption testing, and small cybersecurity tools. Regularly use Bash scripting for automation in Linux environments and Python for building security utilities and running test encryption projects. Currently learning C++ to understand lower-level memory management and build secure applications.
- Network Implementation (Operational and Security)
- Built a multi-subnet VirtualBox lab using OPNsense as the central firewall and router. Implemented segmentation across two dedicated subnets, assigned static IPs, and enforced traffic rules. Integrated Security Onion as an enterprise-grade SIEM to monitor, log, and analyze activity across all vulnerable machines.
- Social Engineering
- Conducted controlled social engineering simulations focusing on clickjacking and malicious redirection. Used Apache web servers and tunneling tools like Ngrok to safely test user-interaction vulnerabilities and demonstrate the risks of phishing-style attacks.