I am a dedicated cybersecurity student with a passion for safeguarding digital environments and a strong foundation in networking and system administration. My academic journey is complemented by hands-on experience in Python programming, Linux (Ubuntu), Windows systems, and Cisco Packet Tracer, where I have worked on tasks such as subnetting, user creation, and permission management in Linux systems.
In addition to my technical background, I have developed operational expertise through my professional role at a logistics company, where I ensure the smooth handling of top-profile shipments, maintain data accuracy in Excel, and coordinate communication through Outlook. This combination of cybersecurity knowledge and logistics experience has honed my skills in problem-solving, attention to detail, and time management, enabling me to excel in both technical and operational environments.
Cybersecurity Tools and Practices:
- Familiarity with secure system architecture, emphasizing user roles, access control, and minimizing attack surfaces.
- Hands-on experience in applying fundamental cybersecurity principles such as the principle of least privilege, user authentication, and secure file sharing.
- Expertise in Linux user management, including adding, modifying, and removing user accounts and groups.
- Configuration of file permissions using chmod, chown, and access control lists (ACLs).
- Understanding of process management and basic shell scripting to automate system administration tasks.
- Writing Python scripts for cybersecurity applications such as scanning open ports, automating password validation, and parsing logs.
- Understanding libraries like os, sys, and sockets for cybersecurity and system interaction.
- Conducting practical labs involving router and switch configuration, exploring the implications of network settings on performance and security.
- Proficiency in Excel for generating reports, tracking inventory or shipments, and using conditional formatting to highlight critical data.
- Tracking and updating top-profile shipments through clear workflows and attention to detail.
- Coordination between multiple stakeholders in a high-pressure logistics environment while maintaining focus on operational goals
- Familiarity with basic compliance frameworks like NIST, ISO 27001, and GDPR.
- Understanding symmetric and asymmetric encryption methods (e.g., AES, RSA).
- Familiarity with hashing algorithms like SHA and MD5 (including their weaknesses).
- Writing Python scripts for tasks such as log analysis, network scanning, and automation.
- Understanding the CIA Triad (Confidentiality, Integrity, Availability).
- Basic knowledge of zero-trust architecture.