Dedicated computer science student with a growing foundation in IT, networking, software engineering, and cybersecurity. Skilled in research, security fundamentals, and understanding how different technologies work together to interpret, process, and output data. Actively developing practical skills through coursework, labs, and certifications, including the Google Cybersecurity Professional Certificate and CompTIA Security+. Passionate about continuous learning and eager to apply academic knowledge in professional environments to contribute to real-world technology and security challenges.
Cisco Packet Tracer - Learning to build configurations of home and office networks with various networking devices such as routers switches, and wireless access points. Then connecting devices with appropriate cables to assign IP addresses statically or dynamically (DHCP). To explore wireless security protocols and use VLANs to segment traffic for better management and security. Lastly, learning about networking controls such as access control lists, port security, NAT,and routing protocols to simulate and trouble shoot different networking scenarios.
VirtualBox - Configured multiple OS VMs such as Windows, Ubuntu, and Kali, to perform various connection testing by establishing SSH between host and client machines, configured iptables and UFW (firewall), log monitoring through syslog and Windows event log for system performance, use nmap for vulnerabilty scanning and SELinux for security configurations.
Network Defense Essentials - Configured Windows Active Directory and Group Policy Management to limit user access to an organization's resources. Network security controls through host-based firewall protection with iptables and Windows firewall for securing endpoints within a network. Configuring network based firewalls to block unwanted website access and port security using pfsense by establishing rules (policies). Installed SoftEther VPN on a host server and client machine to establish a VPN connection between both machines and monitor account access/activity.
EC-Council SOC Analyst - Research network scanning attacks such as SYN, TCP Full connect scan, and UDP scan using nmap to scan networks, ports, devices, and services. Additionally using Wireshark for packet sniffing/analysis to scan networks for known networking attacks and SQL/XSS injection. Conducted logging analysis in Windows with event viewer by configuring local security policies. Configured Internet information services for web server traffic analysis. Implemented the use of Snort (IDS) for monitoring network traffic and log analysis. Collect logs from different machines into a centralized location using Splunk. Generate logs for brute force,SQL injection, XSS, network scanning attempts, and insecure ports/services using Splunk.Indicating IoCs into ELK Stack for monitoring, analyzing, and visualizing log data in real time. Lastly, working on incident response in regards to understanding threats, vulnerabilities, and compromises; detecting incidents, and using tools to contain, eradicate, and recover systems properly and efficiently.