Cybersecurity Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.
I planned, designed, built, and properly configured a virtualized personal cybersecurity training and learning environment. My environment included an attack machine, firewall, IDPS, SIEM tool and a victim machine. I launched an attack from my Kali Linux machine (attacker) against a vulnerable, my firewall, and IDS/IPS alerted and sent logs to SIEM console dashboard. https://github.com/awaafo/Phase2Project.git
As tech lead, I created a solid foundation for securing sensitive data in the cloud by defining project goals, outlining the chosen security approach, and designing a high-level architecture using AWS Key Management Service (KMS) and CloudHSM. https://drive.google.com/drive/folders/1ZD0Ua9q9Tufo2GN6AVeE5Idej-Iv4TSO?usp=drive_link