Summary
Overview
Work History
Education
Skills
Certification
Additional Information
Tools And Technologies
Keywords For Ats Optimization
Projects And Hands On Labs
Timeline
Generic
Darnell Ingram

Darnell Ingram

CYBER SECURITY
Camden,SC

Summary

Aspiring cybersecurity professional with hands-on experience in ethical hacking, network security, and penetration testing. Recently completed a Cybersecurity Certification program from JanBask, where I gained expertise in vulnerability assessments, risk management, and defensive security techniques. Currently enrolled in CompTIA A+ certification training to expand foundational IT knowledge. Skilled in using industry-standard tools such as Kali Linux, Metasploit, and Nmap to identify and mitigate security threats. Passionate about protecting systems, networks, and data, with a focus on continuous learning and professional growth. Seeking an entry-level cybersecurity role to apply my skills in real-world environments and contribute to proactive security measures.

Overview

2
2
years of post-secondary education
3
3
Certifications

Work History

Cybersecurity Analyst Intern

  • Conducted network scans using Nmap and Nessus to identify vulnerabilities
  • Implemented security measures for Active Directory, including user authentication policies
  • Simulated ethical hacking techniques such as SQL injection and XSS attacks for testing security defenses
  • Monitored network traffic with Wireshark for intrusion detection and prevention analysis

Education

Bootcamp in Cybersecurity - Cyber Security

Jan Bask
11.2023 - Current

Some College - Business

Oakland Community College
Royal Oak, MI
08.1996 - 06.1997

Skills

Cybersecurity Fundamentals

undefined

Certification

Life & Health Insurance License, 03/01/23, Present, AZ, AL, FL, GA, IA, IN, LA, MI, MO, MS, NC, OH, OK, SC, TN, TX, WV, 2025 AHIP Certified, 2025 FFM Certified

Additional Information

Passionate about cybersecurity, ethical hacking, and network security., Strong problem-solving and analytical skills, adaptable to fast-paced environments., Interested in roles such as Security Analyst, Penetration Tester, and SOC Analyst.

Tools And Technologies

Kali Linux, Parrot OS, Metasploit, Burp Suite, Wireshark, Nmap, Nessus, Qualys, ZAP, Nikto, Oracle VirtualBox, VMware Workstation, Microsoft Hyper-V, Python (basic), Bash scripting, Palo Alto Networks, CrowdStrike, Zscaler, Qualys, Microsoft Security Suite

Keywords For Ats Optimization

  • Cybersecurity
  • Ethical Hacking
  • Penetration Testing
  • Network Security
  • Vulnerability Assessment
  • Risk Management
  • Compliance
  • Kali Linux
  • Metasploit
  • Nmap
  • SIEM
  • IDS/IPS
  • Cryptography
  • Windows Security
  • Active Directory
  • Cloud Security
  • Malware Analysis
  • CompTIA A+
  • JanBask
  • Threat Intelligence
  • Security Operations
  • OWASP Top 10
  • Firewalls
  • Endpoint Security

Projects And Hands On Labs

  • Penetration Testing Lab, Conducted penetration tests on virtual environments using Metasploit, Kali Linux, and Exploit-DB.
  • Network Security Analysis, Configured firewalls, IDS/IPS, and honeypots to detect and prevent cyber threats.
  • Malware Analysis, Reverse-engineered ransomware samples using Ghidra and analyzed malware behavior.
  • Web Application Security, Identified vulnerabilities in web apps using OWASP Top 10 methodologies.

Timeline

Bootcamp in Cybersecurity - Cyber Security

Jan Bask
11.2023 - Current

Some College - Business

Oakland Community College
08.1996 - 06.1997

Cybersecurity Analyst Intern

Darnell IngramCYBER SECURITY