{"id":149,"date":"2023-08-26T22:16:12","date_gmt":"2023-08-26T22:16:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=149"},"modified":"2025-04-17T18:08:06","modified_gmt":"2025-04-17T18:08:06","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mahmood\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"<p><strong> \ud83d\udd29 Essential Work Habits<\/strong><\/p>\n<p class=\"\" data-start=\"423\" data-end=\"460\"><strong data-start=\"423\" data-end=\"458\">\u2714\ufe0f Methodical &amp; Detail-Oriented<\/strong><\/p>\n<ul data-start=\"461\" data-end=\"650\">\n<li class=\"\" data-start=\"461\" data-end=\"561\">\n<p class=\"\" data-start=\"463\" data-end=\"561\">Network configuration documentation for static IP setups, DHCP reservations, and firewall rules.<\/p>\n<\/li>\n<li class=\"\" data-start=\"562\" data-end=\"650\">\n<p class=\"\" data-start=\"564\" data-end=\"650\">Accuracy and precision in setting up failover solutions for critical infrastructure.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"652\" data-end=\"702\"><strong data-start=\"652\" data-end=\"700\">\u2714\ufe0f Eagerness to Dig Into Technical Questions<\/strong><\/p>\n<ul data-start=\"703\" data-end=\"892\">\n<li class=\"\" data-start=\"703\" data-end=\"798\">\n<p class=\"\" data-start=\"705\" data-end=\"798\">Troubleshooting logs and resolutions for Cradlepoint and Peplink modem connectivity issues.<\/p>\n<\/li>\n<li class=\"\" data-start=\"799\" data-end=\"892\">\n<p class=\"\" data-start=\"801\" data-end=\"892\">Lab assignments from &#8220;Linux System for Cybersecurity&#8221; involving scripting and automation.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"894\" data-end=\"928\"><strong data-start=\"894\" data-end=\"926\">\u2714\ufe0f Adaptability &amp; Enthusiasm<\/strong><\/p>\n<ul data-start=\"929\" data-end=\"1133\">\n<li class=\"\" data-start=\"929\" data-end=\"1044\">\n<p class=\"\" data-start=\"931\" data-end=\"1044\">Successfully transitioned to working independently after only 14 days of training at Connected Solutions Group.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1045\" data-end=\"1133\">\n<p class=\"\" data-start=\"1047\" data-end=\"1133\">Voluntarily handled escalations and contributed to new router deployment procedures.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"1135\" data-end=\"1174\"><strong data-start=\"1135\" data-end=\"1172\">\u2714\ufe0f Analytical &amp; Diagnostic Skills<\/strong><\/p>\n<ul data-start=\"1175\" data-end=\"1366\">\n<li class=\"\" data-start=\"1175\" data-end=\"1275\">\n<p class=\"\" data-start=\"1177\" data-end=\"1275\">Hands-on problem solving with ISP-related escalations and advanced networking misconfigurations.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1276\" data-end=\"1366\">\n<p class=\"\" data-start=\"1278\" data-end=\"1366\">Homework from Cryptography class (number generators, modular arithmetic).<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"1368\" data-end=\"1403\"><strong data-start=\"1368\" data-end=\"1401\">\u2714\ufe0f Innovation &amp; Collaboration<\/strong><\/p>\n<ul data-start=\"1404\" data-end=\"1609\">\n<li class=\"\" data-start=\"1404\" data-end=\"1512\">\n<p class=\"\" data-start=\"1406\" data-end=\"1512\">Collaboration with teammates to improve wireless modem provisioning using internal scripts or templates.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1513\" data-end=\"1609\">\n<p class=\"\" data-start=\"1515\" data-end=\"1609\">Group project for CYSE course: Proposal of cybersecurity policy for critical infrastructure.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"1611\" data-end=\"1653\"><strong data-start=\"1611\" data-end=\"1651\">\u2714\ufe0f Awareness of Cybersecurity Trends<\/strong><\/p>\n<ul data-start=\"1654\" data-end=\"1837\">\n<li class=\"\" data-start=\"1654\" data-end=\"1749\">\n<p class=\"\" data-start=\"1656\" data-end=\"1749\">Regular reading of threat feeds and applying fixes or adjustments to customer environments.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1750\" data-end=\"1837\">\n<p class=\"\" data-start=\"1752\" data-end=\"1837\">Updated configurations in response to security vulnerabilities from vendor notices.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"1839\" data-end=\"1866\"><strong data-start=\"1839\" data-end=\"1864\">\u2714\ufe0f Reliable Execution<\/strong><\/p>\n<ul data-start=\"1867\" data-end=\"2022\">\n<li class=\"\" data-start=\"1867\" data-end=\"1940\">\n<p class=\"\" data-start=\"1869\" data-end=\"1940\">Consistently met SLAs and resolved tickets within expected timeframe.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1941\" data-end=\"2022\">\n<p class=\"\" data-start=\"1943\" data-end=\"2022\">Took initiative on difficult support tickets and ensured client satisfaction.<\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>\ud83d\udde3 Soft Skills<\/strong><\/p>\n<p class=\"\" data-start=\"2048\" data-end=\"2092\"><strong data-start=\"2048\" data-end=\"2090\">\u2714\ufe0f Presentation &amp; Communication Skills<\/strong><\/p>\n<ul data-start=\"2093\" data-end=\"2291\">\n<li class=\"\" data-start=\"2093\" data-end=\"2175\">\n<p class=\"\" data-start=\"2095\" data-end=\"2175\">Delivered walkthroughs to non-technical clients on modem\/router installations.<\/p>\n<\/li>\n<li class=\"\" data-start=\"2176\" data-end=\"2291\">\n<p class=\"\" data-start=\"2178\" data-end=\"2291\">Presentation in Cyber Law class on ethical implications of cybersecurity policy.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"2293\" data-end=\"2340\"><strong data-start=\"2293\" data-end=\"2338\">\u2714\ufe0f Clear Articulation of Complex Concepts<\/strong><\/p>\n<ul data-start=\"2341\" data-end=\"2550\">\n<li class=\"\" data-start=\"2341\" data-end=\"2436\">\n<p class=\"\" data-start=\"2343\" data-end=\"2436\">Email correspondence and documentation written for clients regarding technical resolutions.<\/p>\n<\/li>\n<li class=\"\" data-start=\"2437\" data-end=\"2550\">\n<p class=\"\" data-start=\"2439\" data-end=\"2550\">Paper: &#8220;Cybersecurity Policy in Critical Infrastructure&#8221; \u2013 clearly explained tradeoffs to a general audience.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"2552\" data-end=\"2584\"><strong data-start=\"2552\" data-end=\"2582\">\u2714\ufe0f Active Listening Skills<\/strong><\/p>\n<ul data-start=\"2585\" data-end=\"2789\">\n<li class=\"\" data-start=\"2585\" data-end=\"2686\">\n<p class=\"\" data-start=\"2587\" data-end=\"2686\">Captured specific customer issues during tier-2 support calls and tailored solutions accordingly.<\/p>\n<\/li>\n<li class=\"\" data-start=\"2687\" data-end=\"2789\">\n<p class=\"\" data-start=\"2689\" data-end=\"2789\">Fielded questions from clients and responded with solutions that matched their unique environment.<\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p data-pm-slice=\"0 0 []\">\ud83d\udcbb <strong>Solid Technical Foundation<\/strong><\/p>\n<p class=\"\" data-start=\"2830\" data-end=\"2873\"><strong data-start=\"2830\" data-end=\"2871\">\u2714\ufe0f OS, Networking, and Virtualization<\/strong><\/p>\n<ul data-start=\"2874\" data-end=\"3069\">\n<li class=\"\" data-start=\"2874\" data-end=\"2990\">\n<p class=\"\" data-start=\"2876\" data-end=\"2990\">Lab exercises from Oracle VirtualBox on setting up multiple OS environments.<\/p>\n<\/li>\n<li class=\"\" data-start=\"2991\" data-end=\"3069\">\n<p class=\"\" data-start=\"2993\" data-end=\"3069\">Network troubleshooting logs from your role as a Network Support Engineer.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"3071\" data-end=\"3112\"><strong data-start=\"3071\" data-end=\"3110\">\u2714\ufe0f Programming &amp; Scripting Concepts<\/strong><\/p>\n<ul data-start=\"3113\" data-end=\"3321\">\n<li class=\"\" data-start=\"3113\" data-end=\"3218\">\n<p class=\"\" data-start=\"3115\" data-end=\"3218\">Homework in Cryptography class that included custom scripts for random number generation (LCG, LFSR).<\/p>\n<\/li>\n<li class=\"\" data-start=\"3219\" data-end=\"3321\">\n<p class=\"\" data-start=\"3221\" data-end=\"3321\">Shell scripting assignments from CYSE 270 \u2013 automated tasks on Linux systems.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"3323\" data-end=\"3355\"><strong data-start=\"3323\" data-end=\"3353\">\u2714\ufe0f Programming Proficiency<\/strong><\/p>\n<ul data-start=\"3356\" data-end=\"3524\">\n<li class=\"\" data-start=\"3356\" data-end=\"3425\">\n<p class=\"\" data-start=\"3358\" data-end=\"3425\">Proficient in Bash scripting; exposure to Python from coursework.<\/p>\n<\/li>\n<li class=\"\" data-start=\"3426\" data-end=\"3524\">\n<p class=\"\" data-start=\"3428\" data-end=\"3524\">Knowledge of C\/C++ and Java from foundational courses.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"3526\" data-end=\"3561\"><strong data-start=\"3526\" data-end=\"3559\">\u2714\ufe0f Firewalls &amp; Load Balancers<\/strong><\/p>\n<ul data-start=\"3562\" data-end=\"3713\">\n<li class=\"\" data-start=\"3562\" data-end=\"3645\">\n<p class=\"\" data-start=\"3564\" data-end=\"3645\">Experience configuring LAN\/WAN settings and firewall rules for client networks.<\/p>\n<\/li>\n<li class=\"\" data-start=\"3646\" data-end=\"3713\">\n<p class=\"\" data-start=\"3648\" data-end=\"3713\">Applied knowledge from Fortinet NSE 1\u20133 certification training.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"3715\" data-end=\"3742\"><strong data-start=\"3715\" data-end=\"3740\">\u2714\ufe0f Routers &amp; Switches<\/strong><\/p>\n<ul data-start=\"3743\" data-end=\"3911\">\n<li class=\"\" data-start=\"3743\" data-end=\"3828\">\n<p class=\"\" data-start=\"3745\" data-end=\"3828\">Configured OEM modems and routers including Peplink and Cradlepoint from scratch.<\/p>\n<\/li>\n<li class=\"\" data-start=\"3829\" data-end=\"3911\">\n<p class=\"\" data-start=\"3831\" data-end=\"3911\">Experience with VLAN, routing tables, and troubleshooting port-related issues.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"3913\" data-end=\"3951\"><strong data-start=\"3913\" data-end=\"3949\">\u2714\ufe0f Network Design &amp; Architecture<\/strong><\/p>\n<ul data-start=\"3952\" data-end=\"4107\">\n<li class=\"\" data-start=\"3952\" data-end=\"4006\">\n<p class=\"\" data-start=\"3954\" data-end=\"4006\">Designed and implemented network failover systems.<\/p>\n<\/li>\n<li class=\"\" data-start=\"4007\" data-end=\"4107\">\n<p class=\"\" data-start=\"4009\" data-end=\"4107\">Created logical network diagrams during system implementation.<\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd29 Essential Work Habits \u2714\ufe0f Methodical &amp; Detail-Oriented Network configuration documentation for static IP setups, DHCP reservations, and firewall rules. Accuracy and precision in setting up failover solutions for critical infrastructure. \u2714\ufe0f Eagerness to Dig Into Technical Questions Troubleshooting logs and resolutions for Cradlepoint and Peplink modem connectivity issues. Lab assignments from &#8220;Linux System for&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mahmood\/skills\/\">Read More<\/a><\/div>\n","protected":false},"author":27222,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/pages\/149"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/users\/27222"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/pages\/149\/revisions"}],"predecessor-version":[{"id":588,"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/pages\/149\/revisions\/588"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/media?parent=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}