Results-driven Infrastructure Analyst known for high productivity and efficient task completion. Possess in-depth knowledge in system administration, software development, support, and security. Excel at problem-solving, teamwork, and adaptability, ensuring seamless IT infrastructure operations and improvements. Wanting to apply my extensive education and hands-on lab experience to protect against threat actors and safeguard digital assets in a cybersecurity role.
- Built a home Cyber Security lab with Oracle VirtualBox, including DC, DNS, DHCP, Active Directory, and Splunk servers.
- Set up a Kali Linux box for penetration testing, and Metasploitable to find exploitations on victim network
- Installed and configured a Splunk forwarder to export system logs for SIEM analysis which helped aid in my understanding of detection of malicious behavior such as host attacks, compromised accounts and network IoC
- Used nmap to fingerprint a victims network to identify open ports, OS, and service versions. Researched vulnerabilities for each open port and service to which helped determine the attack vector
- Conducted network attacks such as DoS, brute force, and SQL injection which highlighted the importance of firewall rules, IPS, and IDS in detecting and preventing these attacks.
- Performed host analysis post-attack and implemented security measures to prevent future breaches.
- Utilized SecOnion to monitor host performance during penetration tests and employed sandboxing techniques for malware analysis, including inspecting malicious .DLL files, process creation, file creation, and registry edits/creation