This page highlights three of my top professional skills and showcases supporting artifacts that demonstrate each one in action.
🛡️ Skill 1: Cybersecurity Policy & Compliance
Able to analyze and build practical security governance frameworks through effective policy design, addressing domains such as physical security, data integrity, and incident response.
Artifacts:
- Security Policy: Design and Implementation (CYSE–300)
In this detailed academic project, I developed a corporate security policy covering five critical areas: physical security, confidentiality, integrity, availability, and incident response. The policy integrates recommendations from NIST standards and CISA best practices, emphasizing access controls, tiered data classification, and robust organizational processes to defend against threats. https://sites.wp.odu.edu/jchris82/2024/02/03/security-policy-design-and-implementation/ - Artifact 2: MOVEit Vulnerability Analysis
An analytical breakdown of the 2023 CL0P ransomware attack on MOVEit. The paper covers the exploited zero‑day vulnerability (CVE‑2023‑34362), its global impact on corporate and government systems, and insights into policy failures, especially around patch management, vendor oversight, and intrusion detection frameworks. https://sites.wp.odu.edu/jchris82/2024/01/21/moveit-vulnerability-analysis/ - Artifact 3: CIA Triad — An Analysis
This paper explores the foundational principles of the CIA triad: Confidentiality, Integrity, and Availability, as defined by NIST, and their critical role in designing effective information security policies. It discusses data classification, authorization vs. authentication, non-repudiation, and ensuring reliable data access across distributed environments. The conclusion emphasizes the triad as a practical “trust but verify” framework for securing corporate information systems. https://sites.wp.odu.edu/jchris82/2024/02/03/cia-triad-an-analysis/
🕵️‍♂️ Skill 2: Cybersecurity Analysis & Threat Assessment
Able to analyze vulnerabilities, evaluate cyber threats, and interpret real-world attack scenarios, demonstrating practical knowledge of risk management and defense strategies.
Artifacts:
- Artifact 1: Exploring SCADA — Functionality and Vulnerabilities This research paper provides an overview of Supervisory Control and Data Acquisition (SCADA) systems, their five-tier operational structure, and the cybersecurity risks they face in modern industrial settings. It highlights how legacy infrastructure has evolved and the consequences of cyberattacks on critical systems—referencing real-world incidents like the 2015 Ukraine power grid blackout. This artifact supports my understanding of industrial cybersecurity policy gaps and the need for integrated defenses in operational technology environments. Exploring SCADA: Functionality and Vulnerabilities
- Bug Bounty Policy Review
Analysis of bug bounty programs as a proactive approach to vulnerability management, discussing how ethical hacking contributes to threat detection and software security improvements. Includes evaluation of policy frameworks and real-world examples. https://sites.wp.odu.edu/jchris82/2023/11/18/bug-bounty-policies/ - Cybersecurity Meme Impact Study
A unique exploration of how cybersecurity culture and memes influence awareness, user behavior, and the broader security community’s engagement with threat topics. Demonstrates ability to assess social factors in cybersecurity defense. https://sites.wp.odu.edu/jchris82/2023/10/22/cybersecurity-memes/
🛡️ Skill 3: Resilience and Adaptability
Demonstrated resilience and adaptability by actively learning from challenges and setbacks, iterating through trial and error, and persistently refining practical projects to achieve meaningful progress in cybersecurity and software development.
Artifacts:
- Password Tracker
A Python-based password management tool featuring a graphical interface and robust encryption to securely store user credentials. Developed through multiple iterations, this project reflects problem-solving skills and commitment to security best practices.
https://github.com/ExploitOwl/password-tracker - Internship Application Tracker An organized tracking system built with Python that helps manage internship applications, statuses, and notes. This project exemplifies attention to detail, data handling, and interface usability, developed through ongoing refinement https://github.com/ExploitOwl/internship-application-tracker
- GitHub Repository A comprehensive portfolio of self-directed learning and cybersecurity projects demonstrating a range of technical skills, coding proficiency, and practical experience in software development. GitHub: https://github.com/ExploitOwl