{"id":218,"date":"2025-01-31T06:08:46","date_gmt":"2025-01-31T06:08:46","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-12-10T02:14:04","modified_gmt":"2025-12-10T02:14:04","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/georgesmith\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"<p><strong>Essential Work Habits<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Eager to dig into technical questions and examine them from all sides<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Enthusiastic and highly adaptable<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strong analytical and diagnostic skills<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Keep a current understanding of vulnerabilities from the Internet<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Maintaining awareness and knowledge of contemporary standards, practices, procedures and methods<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ability to get the job done<\/span><\/li>\n<\/ul>\n<p><strong>Soft Skills<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Excellent presentation and communications skills to effectively communicate with management and customers<\/span><\/li>\n<li>Excellent problem-solving skills with extreme persistence.<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ability to clearly articulate complex concepts both written and verbally<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ability, understanding, and usage of active listening skills especially with customers<\/span><\/li>\n<\/ul>\n<p><strong>Feedback Highlights<\/strong><\/p>\n<ul>\n<li><span style=\"font-weight: 400\">&#8220;Overall well written and developed. Great points discussing the social factors and implications influencing the Network Security Policy.&#8221; &#8211; Skip Hiser<\/span><\/li>\n<li>&#8220;Overall well written and developed. I especially liked the use of examples to emphasize your points. Also, good job highlighting the various aspects of protecting critical infrastructure.&#8221; &#8211; Skip Hiser<\/li>\n<li>&#8220;Excellent Job on Homework 5!! Very detailed answers. Keep up the good work and keep being great!!!&#8221; &#8211; Malik Gladden<\/li>\n<\/ul>\n<p><strong>Solid Technical Foundation<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Understand architecture, administration, and management of operating systems, networking, and virtualization software<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">General programming\/software development concepts and software analytical skills<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Understanding of how the different type of firewalls and network load balancers work<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Deep understanding of how network routers and switches work<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Evaluate and design systems and network architectures<\/span><\/li>\n<\/ul>\n<p><strong>Detailed Knowledge of Key Technologies<\/strong><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Open Source Applications<\/span>\n<ul>\n<li>Created a fully isolated homelab environment using open-source tools including OPNsense, Security Onion, and OpenVPN. Configured these systems to simulate real-world network defenses, monitor traffic, and manage secure remote access.<\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Linux Operating Systems<\/span>\n<ul>\n<li>Regularly work with Linux distributions used in cybersecurity, including Kali Linux, Kali Purple, and Parrot OS for penetration testing workflows. Use Linux Mint for daily tasks and advanced command-line practice to strengthen Linux fundamentals.<\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Microsoft Technologies<\/span>\n<ul>\n<li>Deployed and configured multiple Windows environments (Windows 7\u201311) for vulnerability testing and blue team monitoring. Currently implementing Windows Server 2025 in my homelab for Active Directory, domain management, and enterprise-level security practice.<\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Wireless Technologies<\/span>\n<ul>\n<li>Configured an OpenVPN service using EasyRSA to create secure certificate-based authentication. Conducted wireless security testing using tools such as Aircrack-ng, Wireshark, and hardware like the Flipper Zero to analyze Wi-Fi vulnerabilities and test wireless attack simulations in a controlled environment.<\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Web Application Technologies<\/span>\n<ul>\n<li>Performed hands-on testing of web application vulnerabilities using tools such as Burp Suite and custom Apache hosts.<\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Compiled and Interpreted Development Languages<\/span>\n<ul>\n<li>Experience with interpreted languages such as Python for automation, encryption testing, and small cybersecurity tools. Regularly use Bash scripting for automation in Linux environments and Python for building security utilities and running test encryption projects. Currently learning C++ to understand lower-level memory management and build secure applications.<\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Network Implementation (Operational and Security)<\/span>\n<ul>\n<li>Built a multi-subnet VirtualBox lab using OPNsense as the central firewall and router. Implemented segmentation across two dedicated subnets, assigned static IPs, and enforced traffic rules. Integrated Security Onion as an enterprise-grade SIEM to monitor, log, and analyze activity across all vulnerable machines.<\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Social Engineering<\/span>\n<ul>\n<li>Conducted controlled social engineering simulations focusing on clickjacking and malicious redirection. Used Apache web servers and tunneling tools like Ngrok to safely test user-interaction vulnerabilities and demonstrate the risks of phishing-style attacks.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work Habits Eager to dig into technical questions and examine them from all sides Enthusiastic and highly adaptable Strong analytical and diagnostic skills Keep a current understanding of vulnerabilities from the Internet Maintaining awareness and knowledge of contemporary standards,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/georgesmith\/skills-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30474,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/users\/30474"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":435,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/218\/revisions\/435"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}