CS 462

This course provided a technical foundation in network security, protocols, and modern cybersecurity defenses. I gained hands-on experience with core Internet protocols (such as HTTP, DNS, and BGP), explored their vulnerabilities, and studied mitigation techniques, including firewalls, IDS/IPS, and secure communication protocols. The course also introduced cryptographic concepts, authentication systems like Kerberos, and the role of certificates in Transport and Network Layer Security.

Skills

  1. Protocol analysis and vulnerability assessment (HTTP, DNS, BGP)
  2. Implementation and evaluation of network defense tools (firewalls, IDS/IPS)
  3. Understanding of encryption, TLS, and authentication systems (Kerberos, certificates)
  4. Technical problem-solving in layered network environments
  5. Foundational cybersecurity analysis and troubleshooting
  6. Adaptability in learning evolving tools and threat models

Experience

Skill Highlighted: Protocol Analysis and Vulnerability Assessment (HTTP, DNS, BGP)
Also Demonstrates:
Foundational Cybersecurity Analysis and TroubleshootingAdaptability in Learning Evolving Tools and Threat Models

This blog post explores the CVE-2021-40539 vulnerability—also known as the Zoho Bug—which led to a state-sponsored cyberattack on the International Committee of the Red Cross. I traced the vulnerability’s origin in an unpatched Zoho single sign-on tool, detailing how attackers used web shells, privilege escalation, and lateral movement to exfiltrate sensitive data from over 500,000 vulnerable individuals. This artifact showcases my ability to analyze critical vulnerabilities, understand how exploits unfold in real-world contexts, and communicate the broader humanitarian and ethical implications of sophisticated cyberattacks.

blog.edited

Skill Highlighted: Technical Problem-Solving in Layered Network Environments
Also Demonstrates:
Foundational Cybersecurity Analysis and TroubleshootingAdaptability in Learning Evolving Tools and Threat Models

This reflective analysis examines the operational complexity and strategic ambiguity in U.S. cyber operations, comparing cyber warfare to traditional kinetic conflict. By outlining “known unknowns” across intelligence gathering, policy enforcement, legal gray zones, and training environments, I illustrated how layered networks, defense operations, and decision-making structures create vulnerabilities. This artifact demonstrates my ability to dissect real-world cybersecurity structures, anticipate risk under uncertainty, and adapt strategic problem-solving approaches in evolving digital threat landscapes.

12-assign

Skill Highlighted: Implementation and Evaluation of Network Defense Tools (Firewalls, IDS/IPS)
Also Demonstrates:
Protocol Analysis and Vulnerability AssessmentAdaptability in Learning Evolving Tools and Threat ModelsFoundational Cybersecurity Analysis and Troubleshooting

This strategic proposal addresses malware and ransomware threats targeting the retail sector, particularly shopping malls and commercial facilities. Drawing from CISA’s Shields Up and Stop Ransomware campaigns, I proposed practical countermeasures including network segmentation, use of MITRE ATT&CK frameworks, and adoption of real-time endpoint solutions like SentinelOne. I also analyzed international and national cybersecurity plans (e.g., UK’s Cyber Strategy 2022, CISA’s 2023–2025 Strategic Plan) to support policy-driven and technical responses. This work reflects my ability to translate large-scale cyber strategy into actionable, technically grounded defense plans with sector-specific relevance.

13