Essential Work Habits
- Persistence: I’m prepared to tackle difficult problems, learn from failures, and persist until you find solutions.
- Adaptability: I’m flexible and open to change and new ideas. I take pride in my ability to adjust to new situations and environments quickly and as needed.
- Critical Thinking: I tend to approach problems with a questioning mindset to uncover vulnerabilities and devise effective solutions.
- Time Management: I make it a mission to manage time effectively to balance coursework, self-study, and any practical projects or internships. I prioritize tasks based on urgency and importance.
- Accountability: I take ownership of my actions, acknowledging any mistakes and learning from them. I use this to garner trust, respect, and growth professionally when it comes to teams and organizations that I am involved with.
- Attention to Detail: I pay very close attention to small details to maximize accuracy, quality, and thoroughness in tasks and other deliverables. This approach helps mitigate any errors made and allows for professional growth.
- Organization: I like to maintain a tidy workspace and lay my task out before me with lists in hopes of boosting productivity and efficiency. This helps with balancing focus and prioritization of tasks at hand.
Soft Skills
- Communication: I take pride in my communication and presentation skills, both writing and speaking. I make sure to listen to what people have to say and emphasize that communication is a two way street.
- Teamwork/Collaboration: I work most effectively in group settings, sharing information and collaborating on different projects. This goes a long way when trying to complete a project.
- Curiosity: A curious mindset drives continuous learning and exploration in cybersecurity. We, as students, should be naturally curious about how systems work, how threats evolve, and how security measures can be improved.
- Problem Solving: I enjoy puzzles and other difficult problems. I’m very analytic with my thought processes and always take everything into consideration.
- Leadership: I take leadership very seriously, whether it’s me at the helm or a classmate leading the charge on a project. I have a knack for delegating tasks and taking initiative on different projects.
- Creativity: We, as cybersecurity students/professionals, often need to think outside the box to anticipate and mitigate risks or find different angles to situations . Creativity is valuable for devising innovative solutions to complex problems.
Solid Technical Foundation
- Operating Systems: I am very proficient in various operating systems, mainly Linux, Windows, MacOS, and some server OS’s. I can handle configuration, installation, troubleshooting, and updating these operating systems.
- Computer Hardware: I am familiar with the different types of computer hardware; components, peripherals, etc. I can assemble and disassemble towers and laptops without many issues and I can troubleshoot any hardware issues.
- Network Fundamentals: I have a vast knowledge of the OSI Model and network architecture and topographies. I understand the use of many protocols and methods for networking such TCP/IP, subnetting, IP addresses, and routing.
- Computer Software: I have a deep understanding of different computer software packages and programs. I am proficient in Microsoft softwares, Virtualization softwares like VirtualBox and Oracle, as well as programs such as Autopsy and Wireshark.
- Security Technologies: I have an extensive knowledge of firewall rules and how to enable them on computer systems. I understand the usage of IDS/IPS, antivirus software, and VPNs and how they protect various systems and servers.
- Security Compliance and Regulations: I understand the many cybersecurity laws, regulations, and standards such as GDPR, HIPAA, PCI DSS, and NIST framework. I have knowledge of many government acts and regulations such as the many Privacy Acts.
Detailed Knowledge of Key Technologies
- Cryptography: I have a basic understanding of the many cryptographic methods of encryption and decryption. Examples include block ciphers, Diffie-Hellman Key Exchange, and RSA.
- Digital Forensics: I have a good understanding of how digital forensics works and how to create reports that describe different types of evidence that may be found in an investigation. I can administer an Autopsy report/scan of an electronic device and find missing files that may exist.
- Virtualization and Virtual Machines: This is something that I take the most pride in. Initializing virtual machines and tinkering with them has to be a skill that I have enjoyed honing. In the same vein, I have proficiency with command line interfaces within virtual and physical machines.
- Cybercrime and the Darknet: Due to some of my coursework, I have a small understanding of how the darknet works and what it looks like. I have decent knowledge of cybercrime and the different types that occur in our society today.