{"id":218,"date":"2022-01-25T16:30:54","date_gmt":"2022-01-25T16:30:54","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-04-30T14:46:43","modified_gmt":"2025-04-30T14:46:43","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/gridg02\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"<h3 class=\"\" data-start=\"339\" data-end=\"388\"><strong data-start=\"346\" data-end=\"388\">1. Cybersecurity Analysis &amp; Compliance<\/strong><\/h3>\n<p class=\"\" data-start=\"580\" data-end=\"855\"><strong data-start=\"580\" data-end=\"612\">ITR Review Report\u00a0<\/strong><\/p>\n<p class=\"\" data-start=\"580\" data-end=\"855\">PDF showing the technical review process of a cybersecurity design for UFC 4-010-06 compliance.<\/p>\n<p class=\"\" data-start=\"580\" data-end=\"855\"><a href=\"https:\/\/www.wbdg.org\/FFC\/DOD\/UFC\/ufc_4_010_06_2023.pdf\">UFC 4-010-06 Cybersecurity of Facility-Related Control Systems (FRCS)<\/a><\/p>\n<p class=\"\" data-start=\"580\" data-end=\"855\"><em data-start=\"751\" data-end=\"765\">Why it fits:<\/em> Shows federal cybersecurity compliance for physical infrastructure. Though this is not a design from my work, which wouldn&#8217;t be allowed, this does show the process of what I need to follow when checking cybersecurity designs.<\/p>\n<p class=\"\" data-start=\"860\" data-end=\"1146\"><strong data-start=\"860\" data-end=\"917\">SpecsIntact Specification Sample\u00a0<\/strong><\/p>\n<p class=\"\" data-start=\"860\" data-end=\"1146\">PDF excerpt of editing\/designing cybersecurity specs in SpecsIntact.<\/p>\n<p class=\"\" data-start=\"860\" data-end=\"1146\"><a href=\"http:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/Pages-from-UFGS-25-05-11-2.pdf\">Pages from UFGS 25 05 11 (2)<\/a><br data-start=\"1028\" data-end=\"1031\" \/><em data-start=\"1034\" data-end=\"1048\">Why it fits: In order to secure the facilities and the controls with them. The contractors building them on site need specific orders to follow. That is where specifications come to play. This cybersecurity specifications goes over most\/all controls that would need cybersecurity. Some sections being specific to certain controls like HVAC, Fire Alarms, Electrical, etc. have their own sections that require certain things like computers, control panels, or even wires to be secured a certain way.\u00a0<\/em><\/p>\n<p class=\"\" data-start=\"1151\" data-end=\"1408\"><strong data-start=\"1151\" data-end=\"1198\">Draft Risk Management Framework (RMF) Control Mapping\u00a0<\/strong><br data-start=\"1198\" data-end=\"1201\" \/>Table or diagram mapping NIST 800-53 controls.<\/p>\n<p class=\"\" data-start=\"1151\" data-end=\"1408\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-442\" src=\"http:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/Screenshot-48-300x193.png\" alt=\"\" width=\"300\" height=\"193\" srcset=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/Screenshot-48-300x193.png 300w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/Screenshot-48-467x300.png 467w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/Screenshot-48.png 628w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><br data-start=\"1290\" data-end=\"1293\" \/><em data-start=\"1296\" data-end=\"1310\">Why it fits:<\/em> Shows understanding of RMF and compliance tasks. The RMF is a structured process used by U.S. federal agencies and contractors to manage and secure information systems. It involves six steps: categorize the system, select security controls, implement those controls, assess their effectiveness, authorize the system for use, and continuously monitor its security. RMF is based on NIST standards (like NIST SP 800-53) and helps ensure systems meet federal cybersecurity requirements. Its goal is to reduce risk by integrating security and risk management into the system development lifecycle.<\/p>\n<hr class=\"\" data-start=\"1410\" data-end=\"1413\" \/>\n<h3 class=\"\" data-start=\"1415\" data-end=\"1454\"><strong data-start=\"1422\" data-end=\"1454\">2. Network &amp; System Security<\/strong><\/h3>\n<p class=\"\" data-start=\"1603\" data-end=\"1855\"><strong data-start=\"1603\" data-end=\"1662\">Sophos Firewall Policy Documentation (Mock\/Practice)<\/strong><br data-start=\"1662\" data-end=\"1665\" \/><em data-start=\"1668\" data-end=\"1679\">Artifact:<\/em> <a href=\"https:\/\/techvids.sophos.com\/watch\/7oEPqyoKz7ZSPn27Pze8hu\">Sophos Firewall v19.5: Getting Started with Sophos Firewall APIs &#8211; Sophos Techvids \u2013 Expert Tutorials &amp; Cybersecurity Insights<\/a><br data-start=\"1758\" data-end=\"1761\" \/><em data-start=\"1764\" data-end=\"1778\">Why it fits:<\/em> Though I can&#8217;t show it, my previous boss and I had a task on our hands after the storage drive in our firewall gave up. My part of the task was being on the phone for four hours during company hours and talk with a Sophos agent to get it resolved. Meanwhile everyone in the company could not work, meaning very upset coworkers. In the four hours we were able to diagnose, come up with a solution by using a backup firewall, and check all locations for service.<\/p>\n<p class=\"\" data-start=\"1860\" data-end=\"2129\"><strong data-start=\"1860\" data-end=\"1905\">Helpdesk Log &amp; Incident Response Workflow<\/strong><br data-start=\"1905\" data-end=\"1908\" \/><em data-start=\"1911\" data-end=\"1922\">Artifact:<\/em>\u00a0 support log from Indel Power Group, showing resolved network\/system issues. <img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.prod.website-files.com\/5efc3ccdb72aaa7480ec8179\/5f02668b76f98ea9bf7b1196_servicenow.png\" alt=\"JIRA Service Desk vs ServiceNow: Ticketing System Comparison | UpGuard\" width=\"581\" height=\"343\" \/><br data-start=\"2027\" data-end=\"2030\" \/><em data-start=\"2033\" data-end=\"2047\">Why it fits:<\/em> Represents practical experience troubleshooting live IT security\/system problems.<\/p>\n<p class=\"\" data-start=\"2134\" data-end=\"2368\"><strong data-start=\"2134\" data-end=\"2195\">Python Security Script (Port Scanner or Password Checker)<\/strong><br data-start=\"2195\" data-end=\"2198\" \/><em data-start=\"2201\" data-end=\"2212\">Artifact:<\/em> Code file or screenshot from your current Python class.<br data-start=\"2268\" data-end=\"2271\" \/><em data-start=\"2274\" data-end=\"2288\">Why it fits:<\/em> Demonstrates scripting ability\u2014valuable for automation in SOC and SecOps roles.<\/p>\n<hr class=\"\" data-start=\"2370\" data-end=\"2373\" \/>\n<h3 class=\"\" data-start=\"2375\" data-end=\"2440\"><strong data-start=\"2382\" data-end=\"2440\">3. Communication &amp; Professional Cybersecurity Practice<\/strong><\/h3>\n<p class=\"\" data-start=\"2577\" data-end=\"2807\"><strong data-start=\"2577\" data-end=\"2617\">Digital Forensics Lab Setup Proposal<\/strong><br data-start=\"2617\" data-end=\"2620\" \/><em data-start=\"2623\" data-end=\"2634\">Artifact:<\/em> PDF of your full report outlining a three-year forensics lab plan.<br data-start=\"2701\" data-end=\"2704\" \/><em data-start=\"2707\" data-end=\"2721\">Why it fits:<\/em> Professional document showing written communication, research, and security planning.<\/p>\n<p class=\"\" data-start=\"2812\" data-end=\"3062\"><strong data-start=\"2812\" data-end=\"2855\">AI Chatbot Use Case Diagram &amp; Narrative<\/strong><br data-start=\"2855\" data-end=\"2858\" \/><em data-start=\"2861\" data-end=\"2872\">Artifact:<\/em> Image of the diagram and document with the narrative from your team project.<br data-start=\"2949\" data-end=\"2952\" \/><em data-start=\"2955\" data-end=\"2969\">Why it fits:<\/em> Communicates your ability to describe and plan secure digital systems in a business context.<\/p>\n<p class=\"\" data-start=\"3067\" data-end=\"3332\"><strong data-start=\"3067\" data-end=\"3130\">Cybersecurity Career Development Plan (SOC Analyst Roadmap)<\/strong><br data-start=\"3130\" data-end=\"3133\" \/><em data-start=\"3136\" data-end=\"3147\">Artifact:<\/em> Infographic or Word doc describing your step-by-step plan to become a SOC Analyst.<br data-start=\"3230\" data-end=\"3233\" \/><em data-start=\"3236\" data-end=\"3250\">Why it fits:<\/em> Highlights your understanding of professional development and industry awareness.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Cybersecurity Analysis &amp; Compliance ITR Review Report\u00a0 PDF showing the technical review process of a cybersecurity design for UFC 4-010-06 compliance. UFC 4-010-06 Cybersecurity of Facility-Related Control Systems (FRCS) Why it fits: Shows federal cybersecurity compliance for physical infrastructure. Though this is not a design from my work, which wouldn&#8217;t be allowed, this does&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gridg02\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":23330,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/users\/23330"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":445,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages\/218\/revisions\/445"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}