1. Cybersecurity Analysis & Compliance
ITR Review Report
PDF showing the technical review process of a cybersecurity design for UFC 4-010-06 compliance.
UFC 4-010-06 Cybersecurity of Facility-Related Control Systems (FRCS)
Why it fits: Shows federal cybersecurity compliance for physical infrastructure. Though this is not a design from my work, which wouldn’t be allowed, this does show the process of what I need to follow when checking cybersecurity designs.
SpecsIntact Specification Sample
PDF excerpt of editing/designing cybersecurity specs in SpecsIntact.
Pages from UFGS 25 05 11 (2)
Why it fits: In order to secure the facilities and the controls with them. The contractors building them on site need specific orders to follow. That is where specifications come to play. This cybersecurity specifications goes over most/all controls that would need cybersecurity. Some sections being specific to certain controls like HVAC, Fire Alarms, Electrical, etc. have their own sections that require certain things like computers, control panels, or even wires to be secured a certain way.
Draft Risk Management Framework (RMF) Control Mapping
Table or diagram mapping NIST 800-53 controls.
Why it fits: Shows understanding of RMF and compliance tasks. The RMF is a structured process used by U.S. federal agencies and contractors to manage and secure information systems. It involves six steps: categorize the system, select security controls, implement those controls, assess their effectiveness, authorize the system for use, and continuously monitor its security. RMF is based on NIST standards (like NIST SP 800-53) and helps ensure systems meet federal cybersecurity requirements. Its goal is to reduce risk by integrating security and risk management into the system development lifecycle.
2. Network & System Security
Sophos Firewall Policy Documentation (Mock/Practice)
Artifact: Sophos Firewall v19.5: Getting Started with Sophos Firewall APIs – Sophos Techvids – Expert Tutorials & Cybersecurity Insights
Why it fits: Though I can’t show it, my previous boss and I had a task on our hands after the storage drive in our firewall gave up. My part of the task was being on the phone for four hours during company hours and talk with a Sophos agent to get it resolved. Meanwhile everyone in the company could not work, meaning very upset coworkers. In the four hours we were able to diagnose, come up with a solution by using a backup firewall, and check all locations for service.
Helpdesk Log & Incident Response Workflow
Artifact: support log from Indel Power Group, showing resolved network/system issues.
Why it fits: Represents practical experience troubleshooting live IT security/system problems.
Python Security Script (Port Scanner or Password Checker)
Artifact: Code file or screenshot from your current Python class.
Why it fits: Demonstrates scripting ability—valuable for automation in SOC and SecOps roles.
3. Communication & Professional Cybersecurity Practice
Digital Forensics Lab Setup Proposal
Artifact: PDF of your full report outlining a three-year forensics lab plan.
Why it fits: Professional document showing written communication, research, and security planning.
AI Chatbot Use Case Diagram & Narrative
Artifact: Image of the diagram and document with the narrative from your team project.
Why it fits: Communicates your ability to describe and plan secure digital systems in a business context.
Cybersecurity Career Development Plan (SOC Analyst Roadmap)
Artifact: Infographic or Word doc describing your step-by-step plan to become a SOC Analyst.
Why it fits: Highlights your understanding of professional development and industry awareness.