Summary
Overview
Work History
Education
Skills
Key Cybersecurity Projects
Certification
Languages
Education and Training
Websites
Work Availability
Accomplishments
Jeremy Claudio Ojeda

Jeremy Claudio Ojeda

Summary

Cybersecurity Analyst with a focus on defensive security, threat detection, and incident response. Experienced in executing penetration testing, vulnerability assessments, and incident investigations using industry-standard tools such as Splunk, Wireshark, PCAP analysis, SIEM platforms, and Docker. Adept at log correlation, forensic analysis, and remediation planning in both lab environments and real-world simulations. Demonstrated ability to identify, evaluate, and mitigate risks through structured methodologies and practical security projects. CompTIA Security+ certified, with a strong commitment to applying technical expertise in an entry-level SOC Analyst role to enhance organizational security posture and drive continuous improvement.

Overview

5
5
years of professional experience
3
3

Certifications

Work History

ISRTC

US Army
04.2020 - 01.2025
  • Directed and coordinated intelligence, surveillance, and monitoring assets in a secure environment, while managing mission orders, team communications, and operational oversight to ensure effective execution.
  • Utilized multiple secure systems and specialized platforms to gather, analyze, and relay critical information in real time.
  • Communicated directives and provided real-time guidance to operational teams, maintaining constant situational awareness.
  • Logged and documented mission events to support accurate reporting and seamless shift transitions.
  • Excelled in high-pressure, multitasking environments requiring rapid decision-making, precise communication, and technical proficiency across multiple platforms.

Education

Cyber Security Analyst

Triple Ten
09-2025

High School Diploma -

Leominster High School
06-2020

Skills

  • Threat Detection & Incident Response: SIEM monitoring, log analysis, PCAP review, correlation & reporting
  • Security Testing & Vulnerability Management: Penetration testing, exploitation validation, remediation planning
  • Tools & Platforms: Splunk, Wireshark, Docker, PCAPs, SIEM solutions, WordPress vulnerability analysis
  • Cybersecurity Practices: MFA enforcement, SOC alert tuning, HTTPS implementation, patch management
  • Soft Skills: Analytical thinking, technical writing, clear reporting, problem-solving in high-pressure environments

Key Cybersecurity Projects

Project Title | Tools Used | Short Description

Brute-Force Credential Stuffing Analysis and Incident Response Tools: PCAPs, Wireshark, Splunk

  • Investigated a brute-force credential-stuffing attack against a privileged WordPress account.
  • Correlated logs, reconstructed the attack timeline, confirmed compromise, and recommended containment and preventive measures such as MFA enforcement and SOC alert tuning.

Planned Cybersecurity Strategies and Threat Mitigation Measures (RCI Case) Tools: Casefile Analysis, Incident Reporting Frameworks

  • Analyzed a ransomware incident, identified root causes, and developed tailored mitigation strategies.
  • Delivered a finalized report with prioritized recommendations to strengthen resilience and protect business operations.

MegaQuagga Vulnerability Remediation and Security Enhancement Tools: WordPress 5.3, Vulnerable Plugins (Social-Warfare), Burp Suite

  • Conducted a penetration test on a WordPress application, uncovering outdated components, missing HTTPS, and exploitable vulnerabilities (XSS, XML-RPC abuse).
  • Validated risks through exploitation and delivered actionable remediation strategies for patching and securing the environment.

Web Application Penetration Testing and Security Assessment (MegaQuagga) Tools: Burp Suite, WordPress 5.3, Custom Exploits

  • Performed a structured security assessment simulating exploitation to evaluate system weaknesses.
  • Recommended security upgrades, HTTPS enforcement, and continuous patch management.

SIEM Log Analysis with Splunk Tools: Splunk, Sysmon, Windows Event Logs

  • Built detection queries for anomalous PowerShell executions, brute-force attempts, and credential dumping behavior.
  • Designed dashboards to visualize incidents and enhance security monitoring.

Incident Response Lab Tools: VirtualBox, Kali Linux, Windows Server

  • Simulated a ransomware attack and executed an Incident Response Plan (IRP).
  • Performed log review, system isolation, backup restoration, and reporting to ensure recovery and lessons learned.

WebGoat Security Lab Tools: Docker, OWASP WebGoat, Burp Suite

  • Deployed and tested vulnerable applications to practice exploiting OWASP Top 10 vulnerabilities (A1: Broken Access Control, A2: Cryptographic Failures, A3: Stored XSS).
  • Documented findings and provided remediation steps.

Cloud Migration and IT Modernization Proposal (Yagé Botanicals) Tools: Cloud Migration Frameworks, IT Modernization Planning

  • Developed a strategy to migrate IT infrastructure to the cloud, focusing on scalability, cost efficiency, and improved security.
  • Proposed phased migration steps with training and adoption support to strengthen business continuity.

Certification

  • CompTIA Security+
  • Intro to Splunk (eLearning)
  • Secret Clearance

Languages

Spanish
Native/ Bilingual
English
Professional

Education and Training

Education:

TripleTen Cybersecurity Analyst Bootcamp Ongoing – Expected [October,2025]

  • Intensive hands-on program focused on SOC operations, threat detection, and incident response.
  • Completed practical projects in SIEM log analysis (Splunk), packet analysis (Wireshark), penetration testing, and incident response simulations.
  • Gained experience with OWASP WebGoat, Burp Suite, Docker, VirtualBox, Kali Linux, and Windows Server in lab environments.
  • Applied security frameworks and best practices in forensics, vulnerability remediation, and cloud security planning.

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Accomplishments

  • Earned CompTIA Security+ Certification — Validated foundational knowledge in network security, incident response, and risk management, demonstrating readiness for SOC Analyst responsibilities.
  • Working onTripleTen Cybersecurity Analyst Bootcamp — Gained hands-on experience with Splunk, Wireshark, Docker, Burp Suite, WebGoat, Kali Linux, and SIEM platforms through projects focused on threat detection, incident response, penetration testing, and vulnerability remediation.
  • Military Experience — Operated in high-pressure environments requiring real-time decision-making, situational awareness, and mission-critical communication. Directed and coordinated operations using multiple systems simultaneously, demonstrating discipline, adaptability, and leadership transferable to cybersecurity roles.