Cybersecurity professional with hands-on experience in SOC operations, endpoint detection/response (EDR), vulnerability management, and threat analysis. Skilled in log monitoring, malware investigations, SIEM correlation, phishing analysis, and access management across Windows/Linux/Active Directory environments. Strong background in disaster recovery, IAM hardening, and security automation with Python/PowerShell. Certified in CompTIA Security+, Network+, A+, Google Cybersecurity, AWS Security IAM, and ITIL 4, SSCP. Ranked Top 1% globally on TryHackMe. Currently pursuing a B.S. in Cybersecurity Systems.
| Skill | Associated Project |
|---|---|
| Vulnerability Analysis with Nmap and Wireshark | Nmap and Wireshark |
| Gaining a shell and escalation of priveleges | THM Billing Privelage Escaltion |
| RCE/Enumeration and Privilege Escaltioon | THM Publisher Writeup |
| Snort Defensive Security | THM Snort Challenge Task 2 |
| Enumeration/Steganography/Privilege Escalations | THM U.A High School Writeup |
| Anomalous Behavior Discovery and Mitigation | Anomalous Behavior Discovery and Mitigation |
| Google Security Research | Google Security Research |
| IOC Detecttion & Incident Resposne(Splunk) | SOC Home Lab Splunk |
| Configuring IDS & Writing Rules/Managing Alerts | Suricata IDS Windows HomeLab |
| AWS IAM CLI | AWS IAM CLI PROJECT |
| Security Operations: | Incident Detection & Response, Threat Hunting, IOC Analysis, Escalation, Reporting |
| EDR & SIEM Tools: | Splunk, Suricata, Snort, Wireshark, Qualys, OpenVAS, VirusTotal, AV/EDR platforms Cybersecurity Domains: IAM, Vulnerability Management, Malware Analysis, Phishing Defense, DR/BCP |
| Systems & Networking: | Windows Server, Active Directory, Linux (Ubuntu/Kali), TCP/IP, DNS, DHCP, VPNs, Firewalls, IDS/IPS |
| Automation & Scripting: | Python, PowerShell, Bash – log parsing, anomaly detection, security automation Frameworks & Compliance: MITRE ATT&CK;, OWASP Top 10, NIST CSF, ISO 27001, PCI DSS, HIPAA, SOC2, GDPR |
| Nmap | BurpSuite | Wireshark | Splunk | Metasploit | Kali Linux | Hydra | John The Ripper
| CompTIA A+ | | CompTIA Network+ | | CompTIA Security+ | | AWS IAM Security | | Google Cybersecurity Certificate | | Google IT Support Certificate | | ITIL Foundations | | ISC2 SSCP |