Summary
Overview
Work History
Education
Skills
Coursework
Learning Activities
Technical Skills
Certification
References
Timeline
Generic

Kiori Edwards

Norfolk,VA

Summary

Diligent and motivated college student with a passion for cyber security, eager to leverage academic knowledge and hands-on experience to contribute to a dynamic cybersecurity team as an intern. Possessing a solid foundation in network security, ethical hacking, and incident response, along with proficiency in cybersecurity tools and programming languages. Strong analytical skills combined with a commitment to continuous learning and staying updated on the latest cybersecurity trends. Excellent communication and teamwork abilities, ready to collaborate with peers and professionals to tackle real-world security challenges. Seeking an internship opportunity to further develop skills, gain practical experience, and make meaningful contributions to safeguarding digital assets and mitigating cyber threats.

Overview

1
1
Certification

Work History

Cyber Crime Research

  • Conducted comprehensive research project on cybersecurity, delving into contemporary crime trends, risk assessment methodologies, and mitigation strategies
  • Demonstrated analytical prowess in evaluating complex data sets and synthesizing findings into actionable insights
  • Utilized a multidisciplinary approach to investigate cyber threats, contributing to a deeper understanding of cybercrime dynamics and fostering proactive solutions.

Securing the pfSense Firewall

  • Removed insecure and unneeded protocols while implementing security configuration parameters on network devices and other technologies using secure network administration principles.

Implementing NAT and Allowing Remote Access

  • Set up and connected to a remote machine on an external network so it can connect through Remote Access/Virtual Private Network (VPN) to access resources on the internal network.

Implementing Common Protocols and Services

  • Used TELNET, Secure Shell (SSH), File Transfer Protocol (FTP), and Secure Copy (SCP) to perform functions between two systems on a network
  • Examine traffic with Wireshark, through an open source Protocol Analyzer.

Implementing Security Policies on Windows and Linux

  • Analyzed a network capture file containing wireless traffic
  • Examine protocols, Internet Protocol (IP) addresses, and Media Access Control (MAC) addresses, as well as analyze other information from traffic
  • Used a protocol analyzer called Wireshark using a network capture in pcap format
  • FIltered packet captures to review the wireless network beacons and application layer traffic: File Transfer Protocol (FTP), telnet, and Post Office Protocol (POP3).

Incident Response Procedures, Forensics, and Forensic Analysis

  • Acted as an attacker, exploited a remote system
  • After attacking the victim machine, analyzed web logs and performed an incident response on a compromised host.

Education

Bachelor of Science - Cybersecurity

Old Dominion University
Norfolk, VA
05.2025

Skills

  • Network Security
  • Information Security Fundamentals
  • Ethical Hacking
  • Cybersecurity Tools
  • Incident Response
  • Risk Assessment
  • Programming and Scripting
  • Security Awareness
  • Communication skills
  • Continuous Learning

Coursework

  • Cybersecurity technology - Understanding in describing how the components, mechanisms, and functions of cyber systems produce security concerns.
  • Python - Acquired a comprehensive understanding of the language's fundamental concepts and its practical applications.
  • Linux Fundamentals - Using Linux taught me the value of open-source software and the strength of community-driven development, which promotes creativity and collaboration. I also learned a lot about system administration, shell scripting, and command-line programs, which will help me manage and personalize my computing environment more effectively.
  • Cyber Law - Dealt with various aspects of cyber law which have allowed me to learn the depth of consequential effects of cyber threats, data breaches, and other security incidents
  • Windows System Management and Security - Learned how to mitigate malware threats, identify security issues by using auditing and the Advanced Threat Analysis feature in Windows Server, secure your virtualization platform, and use new deployment options for enhancing security.
  • Introduction to Cybersecurity - Learned the fundamentals within detail of cybersecurity. This course enlightened me on operating system vulnerabilities, cryptography, network security, and many other fundamental security concepts.
  • Cybersecurity Fundamentals (Presently Learning)
  • Cybersecurity Techniques and Operation (Presently Learning)
  • Basic CyberSecurity Programming and Networking (Presently Learning)

Learning Activities

  • TryHackMe
  • Old Dominion University CyberOps CTF
  • Cyber Fast Track
  • Cyber-Law
  • PicoCTF
  • CS2A

Technical Skills

  • Programming Languages: Python
  • Cybersecurity Tools: Wireshark
  • Operating Systems: Windows, Linux (Kali Linux)
  • Networking: TCP/IP, DNS, DHCP
  • Web Development: HTML/CSS
  • Penetration Testing Tools: Nmap, Kali Linux

Certification

  • CompTIA Security+
  • CompTIA Pen Test

References

References available upon request.

Timeline

Cyber Crime Research

Securing the pfSense Firewall

Implementing NAT and Allowing Remote Access

Implementing Common Protocols and Services

Implementing Security Policies on Windows and Linux

Incident Response Procedures, Forensics, and Forensic Analysis

Bachelor of Science - Cybersecurity

Old Dominion University
Kiori Edwards