
I am a driven individual with a strong passion for cybersecurity and a deep interest in Threat analysis. I successfully completed the esteemed cybersecurity program at UNC Charlotte. My main goal is to expand my knowledge through meaningful connections and immersive learning experiences. I possess excellent interpersonal skills, effective time management, and a robust problem-solving aptitude. In pursuit of a challenging position in cybersecurity, I am eager to contribute to a dynamic team, seek guidance, and maintain an unwavering dedication to achieving mission success, advancing organizational progress, and fostering teamwork. My objective is to integrate my cybersecurity skills with Threat analysis skills to monitor cybersecurity events, detect incidents, and investigate incidents improve cybersecurity strategies, and implement proactive measures. In summary, my determination lies in excelling in the cybersecurity field and specializing as a Threat analyst. I aspire to utilize insights for informed decision-making, process improvement, and contributing to overall organizational success.
Building a Security Monitoring Environment, Used Splunk to build a custom security monitoring environment for a fictional organization, tested that environment against simulated attacks, and presented your monitoring environment to the class. Reviewed Windows Server Logs, and created a report of the findings Reported Analysis for Severity, detecting any suspicious changes in severity Alert Analysis for Failed Windows Activity Alert Analysis for Successful Logins Alert Analysis for Deleted Accounts Report Analysis for HTTP Response Codes Alert Analysis for International Activity Alert Analysis for HTTP POST Activity Dashboard Analysis for Time Chart of HTTP Methods Dashboard Analysis for Cluster Map, https://docs.google.com/presentation/d/1Uo_S6HQpwWyzw4PoLede6zb5MdmG7bPUBBfG7CPp1Gg/edit#slide=id.g2628ae1_0ce2_0_28 BootCon Nikto, Used Nikto a pen-testing tool used to scan web servers for vulnerabilities and for outdated software/programs. We then demonstrated this tool in presentation form using google slides, we first scanned DVWA using a Single IP (192.168.13.25): We Identified vulnerabilities, such as the creation of cookies without the HTTPonly flag. Next, we discovered server information: Apache/2.4.25(Debian). We also noted the root page redirects you to the login.php. We, Explored robots.txt, finding forbidden or redirect HTTP codes (302) and a single entry to be manually viewed. Next, we scanned Multiple Domains using a Text File: We did this by creating a text file using nano and added a single IP address and Scanme.nmap.org. We then ran a scan to gather information about the servers, which revealed a vulnerability including allowed HTTP methods (Get, Head, Post). Last we use Output Format: To demonstrate the ability that Nikto has to output scan results to a file with various formats like CSV, HTML, XML. For our demonstration, we used a text file with the command nikto -h 192.168.13.25 -o Scan.txt. Next we checked the results using cat Scan.txt., https://docs.google.com/presentation/d/13BTeiJChJ4AwQ2d5hZwUG62zBrOuFoZRvotGARj1oMM/edit#slide=id.g2a55d45d942_1_148 Exploit Vulnerabilities in Rekall Corporation's Web Application, Linux Servers, and Windows Servers, Conducted a penetration test by attacking a fictional organization's web application, Linux servers, and Windows servers. Then, I created a report summary based on those findings., https://docs.google.com/document/d/1k-uz4PvLJKC6OOdHwGxUyGjs4Y1QK9YAslxr7s8lxoo/edit Build, Secure, and Protect a Web Application, I built, secured, and protected a cloud application that hosts my own cyber blog, https://docs.google.com/document/d/16iNtOGMW2LKhb6UmVkAl2GDeWzOy8roS0o5Ke0c1ttI/edit