About Me
I am a third-year IT student with a passion for cybersecurity, combining meticulous attention to detail, adaptability, and strong communication skills to solve complex security challenges. Driven to safeguard organizations from evolving digital threats, I value ethical practices and continuous learning to keep pace with the field. Eager to contribute by identifying vulnerabilities, enhancing digital defenses, and supporting teams that prioritize data integrity and trust, I am committed to making a meaningful impact in protecting both organizations and individuals.
Certifications
Google Cybersecurity Certificate
Issued by Google through Coursera
This professional certificate program provided hands-on experience with Python, Linux, SQL, Security Information and Event Management (SIEM) tools, and Intrusion Detection Systems (IDS). Covered key cybersecurity skills including network security, operating system security, and incident response.
Technical Skills
Security Operations
Proficient in SIEM tools, IDS/IPS, and security monitoring. Experience with Splunk for security monitoring and analysis.
Network Security
Experience with network security tools, packet analysis, and implementing security controls. Knowledge of TCP/IP, DNS, and network protocols.
Security Tools & Scripting
Proficient in Python for security automation, Linux command line, and SQL for data analysis. Experience with security tools like Wireshark.
Incident Response
Trained in security incident response procedures, digital forensics, and malware analysis. Experience with the NIST framework.
Security Compliance
Knowledge of security frameworks and compliance standards including NIST, ISO 27001, and GDPR requirements.
Cloud Security
Understanding of cloud security principles and best practices for securing cloud environments and services.
Featured Projects
Controls and Compliance Assessment – Botium Toys
Conducted a thorough controls and compliance assessment for a fictional company, focusing on areas such as disaster recovery, intrusion detection, encryption, backups, and password management. Advised on adhering to PCI DSS, GDPR, and SOC requirements to minimize risk and improve data protection.
Network Traffic Analysis
Conducted a network traffic analysis project focusing on DNS and ICMP protocols to identify potential security threats. Utilized network protocol analyzer tools to examine IP datagrams and assess network traffic patterns. The project involved analyzing packet-level data to detect anomalies and suspicious activities, providing valuable insights for cybersecurity risk assessment.
Web Server Security Incident Response
Conducted a security analysis of a SYN flood DoS attack that disrupted a travel agency's web services. Identified the attack through packet analysis, developed recommendations to prevent future incidents.
Incident Report Analysis - DDoS Response
Conducted a comprehensive analysis of a DDoS incident targeting company infrastructure. Led the response following NIST framework, implementing immediate countermeasures and long-term security enhancements to prevent future attacks.
Automated IP Access Management
Developed a Python script to automate the management of IP address access controls. The solution maintains an allow list of approved IPs and automatically removes outdated entries based on a remove list, ensuring secure and efficient access control management.
Linux File Permissions Management
Led a security-focused review and adjustment of file and folder permissions within a company projects directory on Linux. Ensured access levels matched user roles and requirements, maintaining both usability and security through detailed permission audits and policy implementation.
SQL Query Filters for Security Analysis
Applied SQL filters to enhance organizational security by monitoring and addressing potential vulnerabilities. Created targeted queries to analyze login attempts, identify suspicious activities, and manage employee device updates across departments.
Database Server Vulnerability Assessment
Designed and managed a centralized database server to securely store and organize customer, campaign, and analytics data, ensuring data security and supporting marketing operations.
Incident Handler's Journal
Documented a comprehensive incident response scenario using the 5 W's methodology (Who, What, When, Where, Why) to analyze and respond to a security breach. Created a detailed incident handler's journal that demonstrates systematic approach to incident documentation and response.