Skills

I am a dedicated cybersecurity student with a passion for safeguarding digital environments and a strong foundation in networking and system administration. My academic journey is complemented by hands-on experience in Python programming, Linux (Ubuntu), Windows systems, and Cisco Packet Tracer, where I have worked on tasks such as subnetting, user creation, and permission management in Linux systems.

In addition to my technical background, I have developed operational expertise through my professional role at a logistics company, where I ensure the smooth handling of top-profile shipments, maintain data accuracy in Excel, and coordinate communication through Outlook. This combination of cybersecurity knowledge and logistics experience has honed my skills in problem-solving, attention to detail, and time management, enabling me to excel in both technical and operational environments.

Cybersecurity Tools and Practices:

  • Familiarity with secure system architecture, emphasizing user roles, access control, and minimizing attack surfaces.
  • Hands-on experience in applying fundamental cybersecurity principles such as the principle of least privilege, user authentication, and secure file sharing.
  • Expertise in Linux user management, including adding, modifying, and removing user accounts and groups.
  • Configuration of file permissions using chmod, chown, and access control lists (ACLs).
  • Understanding of process management and basic shell scripting to automate system administration tasks.
  • Writing Python scripts for cybersecurity applications such as scanning open ports, automating password validation, and parsing logs.
  • Understanding libraries like os, sys, and sockets for cybersecurity and system interaction.
  • Conducting practical labs involving router and switch configuration, exploring the implications of network settings on performance and security.
  • Proficiency in Excel for generating reports, tracking inventory or shipments, and using conditional formatting to highlight critical data.
  • Tracking and updating top-profile shipments through clear workflows and attention to detail.
  • Coordination between multiple stakeholders in a high-pressure logistics environment while maintaining focus on operational goals
  • Familiarity with basic compliance frameworks like NIST, ISO 27001, and GDPR.
  • Understanding symmetric and asymmetric encryption methods (e.g., AES, RSA).
  • Familiarity with hashing algorithms like SHA and MD5 (including their weaknesses).
  • Writing Python scripts for tasks such as log analysis, network scanning, and automation.
  • Understanding the CIA Triad (Confidentiality, Integrity, Availability).
  • Basic knowledge of zero-trust architecture.