Kevin Malnar

Cybersecurity Professional

Securing the digital world, one vulnerability at a time

Get In Touch

About Me

I am a third-year IT student with a passion for cybersecurity, combining meticulous attention to detail, adaptability, and strong communication skills to solve complex security challenges. Driven to safeguard organizations from evolving digital threats, I value ethical practices and continuous learning to keep pace with the field. Eager to contribute by identifying vulnerabilities, enhancing digital defenses, and supporting teams that prioritize data integrity and trust, I am committed to making a meaningful impact in protecting both organizations and individuals.

Security Analysis
Security Operations
Network Security

Certifications

Google Cybersecurity Certificate

Google Cybersecurity Certificate

Issued by Google through Coursera

This professional certificate program provided hands-on experience with Python, Linux, SQL, Security Information and Event Management (SIEM) tools, and Intrusion Detection Systems (IDS). Covered key cybersecurity skills including network security, operating system security, and incident response.

Technical Skills

Security Operations

Proficient in SIEM tools, IDS/IPS, and security monitoring. Experience with Splunk for security monitoring and analysis.

Network Security

Experience with network security tools, packet analysis, and implementing security controls. Knowledge of TCP/IP, DNS, and network protocols.

Security Tools & Scripting

Proficient in Python for security automation, Linux command line, and SQL for data analysis. Experience with security tools like Wireshark.

Incident Response

Trained in security incident response procedures, digital forensics, and malware analysis. Experience with the NIST framework.

Security Compliance

Knowledge of security frameworks and compliance standards including NIST, ISO 27001, and GDPR requirements.

Cloud Security

Understanding of cloud security principles and best practices for securing cloud environments and services.

Featured Projects

Controls and Compliance Assessment – Botium Toys

Conducted a thorough controls and compliance assessment for a fictional company, focusing on areas such as disaster recovery, intrusion detection, encryption, backups, and password management. Advised on adhering to PCI DSS, GDPR, and SOC requirements to minimize risk and improve data protection.

Risk Assessment Compliance Security Controls
View Full Report on Google Docs

Network Traffic Analysis

Conducted a network traffic analysis project focusing on DNS and ICMP protocols to identify potential security threats. Utilized network protocol analyzer tools to examine IP datagrams and assess network traffic patterns. The project involved analyzing packet-level data to detect anomalies and suspicious activities, providing valuable insights for cybersecurity risk assessment.

Network Security Traffic Analysis Incident Response
View Full Report on Google Docs

Web Server Security Incident Response

Conducted a security analysis of a SYN flood DoS attack that disrupted a travel agency's web services. Identified the attack through packet analysis, developed recommendations to prevent future incidents.

Incident Response DoS Mitigation Network Security
View Incident Report View Logs

Incident Report Analysis - DDoS Response

Conducted a comprehensive analysis of a DDoS incident targeting company infrastructure. Led the response following NIST framework, implementing immediate countermeasures and long-term security enhancements to prevent future attacks.

Incident Response NIST Framework DDoS Mitigation
View Full Report

Automated IP Access Management

Developed a Python script to automate the management of IP address access controls. The solution maintains an allow list of approved IPs and automatically removes outdated entries based on a remove list, ensuring secure and efficient access control management.

Python Access Control Automation
View Project Documentation

Linux File Permissions Management

Led a security-focused review and adjustment of file and folder permissions within a company projects directory on Linux. Ensured access levels matched user roles and requirements, maintaining both usability and security through detailed permission audits and policy implementation.

Linux Security File Permissions Access Control
View Full Project

SQL Query Filters for Security Analysis

Applied SQL filters to enhance organizational security by monitoring and addressing potential vulnerabilities. Created targeted queries to analyze login attempts, identify suspicious activities, and manage employee device updates across departments.

SQL Data Analysis Security Monitoring
View Project Details

Database Server Vulnerability Assessment

Designed and managed a centralized database server to securely store and organize customer, campaign, and analytics data, ensuring data security and supporting marketing operations.

Vulnerability Assessment Database Security Risk Management
View Full Report

Incident Handler's Journal

Documented a comprehensive incident response scenario using the 5 W's methodology (Who, What, When, Where, Why) to analyze and respond to a security breach. Created a detailed incident handler's journal that demonstrates systematic approach to incident documentation and response.

Incident Response Documentation 5 W's Methodology
View Full Report