Skills

Essential Work Habits

During my coursework and internship experience, I have developed several professional habits that are essential for working in cybersecurity and technology environments. My academic projects and internship have required strong attention to detail, analytical thinking, and the ability to approach technical challenges from multiple perspectives.

One of my strongest work habits is the ability to work methodically and with strong attention to detail. In cybersecurity labs and network security exercises, small configuration mistakes can prevent systems from functioning properly or create vulnerabilities. Through assignments involving firewall configuration, packet analysis, and network monitoring, I have learned the importance of carefully verifying configurations and analyzing results step-by-step.

I also demonstrate an eagerness to explore technical questions and examine them from multiple angles. During my internship, I researched how large language models operate and how they can be applied to detecting phishing emails. This required reviewing technical documentation, studying machine learning concepts, and evaluating different implementation strategies.

Another important habit I have developed is adaptability and enthusiasm when learning new technologies. Cybersecurity and artificial intelligence evolve rapidly, and many of my projects required learning tools or concepts that were unfamiliar at first. Through hands-on experimentation and continued research, I was able to adapt and develop a stronger understanding of these systems.

My coursework has also strengthened my analytical and diagnostic skills. For example, in network analysis labs using Wireshark, I examined packet captures to identify sensitive information transmitted in plaintext and diagnose security weaknesses. These exercises required careful interpretation of network traffic and protocol behavior.

I have also demonstrated innovation and collaboration through academic projects and discussions with instructors and colleagues. My internship project involving the development of an AI-based phishing email detector required creative problem solving and collaboration with leadership to determine realistic goals and technical approaches.

Finally, I maintain awareness of cybersecurity vulnerabilities and industry practices by regularly reviewing security topics covered in coursework, researching current cyber threats, and studying how attackers exploit systems. This ongoing learning helps ensure I stay informed about modern security standards, practices, and emerging risks.

Example Artifacts

  • Internship research notes on AI phishing email detection

  • Cybersecurity lab reports involving network scanning and firewall configuration

  • Packet analysis exercises using Wireshark

  • Coursework assignments analyzing cybersecurity threats and vulnerabilities


Soft Skills

In addition to technical skills, strong communication and interpersonal abilities are essential for working in cybersecurity and technology roles. Through coursework, presentations, and my internship experience, I have developed the ability to clearly communicate technical information and collaborate with others effectively.

One of my strongest soft skills is the ability to clearly articulate complex technical concepts in both written and verbal communication. Many of my assignments required explaining cybersecurity topics in written reports, such as research papers on AI-driven cyber threats and reflection essays describing my internship experience.

I have also developed presentation and communication skills through academic presentations and written reports. These experiences required translating technical information into language that is understandable to both technical and non-technical audiences.

Another important skill I have developed is active listening, particularly when discussing technical challenges with instructors or internship supervisors. Understanding requirements and feedback is critical in cybersecurity projects where small misunderstandings can lead to incorrect system configurations or incomplete solutions.

These soft skills help ensure that technical solutions can be effectively communicated to managers, colleagues, and stakeholders who may not have the same technical background.

Example Artifacts

  • Presentation slides from cybersecurity coursework

  • Internship reflection essays

  • Research papers on cybersecurity topics

  • Recorded or documented presentations explaining technical topics


Solid Technical Foundation

My academic program has provided a strong foundation in core cybersecurity and information technology concepts. Through coursework and hands-on labs, I have gained experience with operating systems, networking technologies, programming concepts, and system security.

I have developed an understanding of operating system architecture, administration, and networking concepts through coursework and laboratory exercises. These labs involved configuring virtual machines, analyzing network communications, and securing systems against potential threats.

My coursework has also introduced me to programming and software development concepts, including writing and analyzing code. These skills support cybersecurity tasks such as automation, vulnerability analysis, and understanding how software vulnerabilities occur.

I also have experience working with network security tools and infrastructure, including firewalls, routers, and packet analysis tools. Labs involving firewall configuration and network traffic monitoring helped me understand how organizations control and monitor network communications.

Additionally, I have practiced evaluating and designing network architectures in coursework projects, where I analyzed how systems communicate and how security controls should be implemented within network environments.

These technical skills form the foundation for more advanced cybersecurity analysis, threat detection, and system defense strategies.

Example Artifacts

  • Firewall configuration lab screenshots (pfSense)

  • Network scanning exercises using Kali Linux tools

  • Programming assignments

  • Network architecture diagrams from coursework


Detailed Knowledge of Key Technologies

Through both coursework and independent study, I have gained familiarity with a range of technologies used in cybersecurity and information technology environments.

I have worked with Linux operating systems in lab environments using tools commonly used for penetration testing and network analysis. This experience includes using command-line utilities, configuring networking tools, and analyzing system behavior.

I also have experience with Microsoft technologies, including Windows Server environments used in cybersecurity labs. These environments helped me understand system administration concepts and network services.

My coursework has introduced me to network implementation and security technologies, including firewalls, intrusion detection concepts, and network monitoring tools.

I have also explored web technologies and database concepts through coursework and research projects, helping me understand how modern web applications function and where security vulnerabilities may occur.

Additionally, my research into phishing detection and cybersecurity threats has provided insight into social engineering techniques, which are a major factor in modern cyberattacks.

Together, these experiences have helped me build a broad understanding of the technologies that cybersecurity professionals must secure and manage.

Example Artifacts

  • Linux command line exercises and labs

  • Windows Server security configuration labs

  • Network security lab reports

  • Research on phishing attacks and social engineering