{"id":110,"date":"2025-01-31T06:08:46","date_gmt":"2025-01-31T06:08:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=110"},"modified":"2026-03-30T00:01:09","modified_gmt":"2026-03-30T00:01:09","slug":"resume","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/georgesmith\/resume\/","title":{"rendered":"Resume"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">George D. Smith III<\/h2>\n\n\n\n<p>Security+ Certified | Entry-Level Cybersecurity Candidate | Blue &amp; Red Team Foundations | Windows &amp; Linux Security<\/p>\n\n\n\n<p>Newport News, VA | <a href=\"mailto:georged.smith4@gmail.com\">georged.smith4@gmail.com<\/a> | (757) 839-3592 | <a href=\"https:\/\/github.com\/tsgds05\">GitHub Profile<\/a> <a>| <\/a><a href=\"http:\/\/www.linkedin.com\/in\/george-smith-1b62b6295\">LinkedIn URL<\/a> | <a href=\"https:\/\/sites.wp.odu.edu\/georgesmith\/\">ePortfolio<\/a><\/p>\n\n\n\n<p>Cybersecurity student with hands-on experience configuring, hardening, testing, and analyzing systems across Windows, Linux, and networked environments. Operates a multi-subnet home lab to simulate real-world red and blue team scenarios, focusing on firewall design, Active Directory security, logging visibility, and controlled penetration testing. Approaches security work with an emphasis on scope, documentation, and understanding both attacker behavior and defensive impact.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Education <\/strong><strong><\/strong><\/h1>\n\n\n\n<p><strong>Bachelor of Science in Cybersecurity<\/strong><\/p>\n\n\n\n<p>Old Dominion University \u2014 Norfolk, VA<\/p>\n\n\n\n<ul>\n<li>Expected Graduation: December 2026 <\/li>\n\n\n\n<li>GPA: 3.53<\/li>\n<\/ul>\n\n\n\n<p>Honors:<\/p>\n\n\n\n<ul>\n<li>Dean\u2019s List (2023\u2013Present)<\/li>\n\n\n\n<li>Cybersecurity Scholar<\/li>\n\n\n\n<li>ODU CyberOps CTF Participant (2024\u20132026)<\/li>\n\n\n\n<li>Mid-Atlantic Collegiate Cyber Defense Competition Participant (2026)<\/li>\n\n\n\n<li>VMI CyberFusion Competition Participant (2026)<\/li>\n\n\n\n<li>CNU CyberForge Participant (2026)<\/li>\n\n\n\n<li>UMGC\u2019s MACCDC HTB CTF 3<sup>rd<\/sup> Place Team (2026)<\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Certifications<\/strong><\/h1>\n\n\n\n<p>CompTIA Security+ (SY0-701) &#8211; Credential ID: &nbsp;<a href=\"https:\/\/cp.certmetrics.com\/CompTIA\/en\/public\/verify\/credential\/f35f2fe77b4f401ab826b641bafc0b8b\">f35f2fe77b4f401ab826b641bafc0b8b<\/a><\/p>\n\n\n\n<p>Offensive Security Certified Professional (OSCP) \u2014 <em>In Progress (July 2026)<\/em><\/p>\n\n\n\n<p>CompTIA CySA+ \u2014 <em>In Progress (December 2026)<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Technical Skills<\/strong><\/h1>\n\n\n\n<p><strong>Programming:<\/strong> Python, Bash, PowerShell, C++ (foundational)<\/p>\n\n\n\n<p><strong>Operating Systems:<\/strong> Windows 7\u201311, Windows Server 2025, Kali Linux, Kali Purple, Ubuntu Linux, Metasploitable<\/p>\n\n\n\n<p><strong>Security Tools:<\/strong><br>Nmap, Metasploit, Wireshark, Burp Suite, Aircrack-ng, SEToolKit, Gophish, RouterSploit, Wazuh, Security Onion, Fail2ban<\/p>\n\n\n\n<p><strong>Networking:<\/strong><br>TCP\/IP, Subnetting, VLANs, NAT, Firewall Configuration, Network Segmentation<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Security Concepts<\/strong><\/h1>\n\n\n\n<p>\u2022 Penetration Testing Methodology (MITRE ATT&amp;CK)<br>\u2022 Incident Response Fundamentals<br>\u2022 Log Analysis &amp; SIEM Monitoring<br>\u2022 Red Team vs Blue Team Operations<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Cybersecurity Projects<\/strong><\/h1>\n\n\n\n<p><strong>Home Lab Architect &amp; Operator<\/strong> <em>(2024\u2013Present)<\/em><br>Designed and maintained a multi-subnet virtual cybersecurity lab simulating real-world red and blue team operations.<br>\u2022 Built segmented networks using OPNSense with firewall rules, NAT, and traffic isolation<br>\u2022 Deployed Windows Server (Active Directory) to test privilege escalation and misconfigurations<br>\u2022 Integrated Wazuh SIEM for log monitoring and detection analysis across endpoints<br>\u2022 Used Security Onion for network-based monitoring and traffic analysis on isolated subnets<br>\u2022 Simulated attacks using Kali Linux and analyzed detection visibility from the defender&#8217;s perspective<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Penetration Testing &amp; Offensive Security Practice<\/strong><br>Performed controlled penetration testing in lab environments using industry tools.<br>\u2022 Conducted enumeration and exploitation using Nmap and Metasploit<br>\u2022 Practiced privilege escalation and post-exploitation techniques<br>\u2022 Used RouterSploit for embedded device testing<br>\u2022 Simulated phishing campaigns using Gophish and SEToolKit<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Penetration Testing Documentation &amp; Analysis (In Progress)<\/strong><br>Developed structured documentation of penetration testing activities within a controlled lab environment.<br>\u2022 Recorded reconnaissance, enumeration, and exploitation attempts across multiple target systems<br>\u2022 Analyzed scan results, service behavior, and vulnerabilities identified during testing<br>\u2022 Organized findings into a structured format aligned with penetration testing methodologies<br>\u2022 Built reports that translate technical findings into clear security insights<\/p>\n","protected":false},"excerpt":{"rendered":"<p>George D. Smith III Security+ Certified | Entry-Level Cybersecurity Candidate | Blue &amp; Red Team Foundations | Windows &amp; Linux Security Newport News, VA | georged.smith4@gmail.com | (757) 839-3592 | GitHub Profile | LinkedIn URL | ePortfolio Cybersecurity student with&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/georgesmith\/resume\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30474,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"[]","_links_to":"","_links_to_target":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/110"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/users\/30474"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/comments?post=110"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/110\/revisions"}],"predecessor-version":[{"id":588,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/110\/revisions\/588"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/media?parent=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}