Experienced professional with a strong background in technology-related roles. Proficient in cyber security, system administration, and technical support. Skilled in problem-solving and optimizing performance. Capable of managing projects and collaborating effectively with teams. Committed to continuous learning and staying current with industry trends to contribute to organizational success.
Building a Security Monitoring Environment | https://docs.google.com/presentation/d/1Q8JJtp57oO8BKXaXkY5r2MqwN7qle4FH0jmAdDpt5XM/edit?usp=sharing
● Used Splunk to build a custom security monitoring environment
● Tested that environment against simulated attacks
presented the monitoring environment to the class
Penetration Test and Report Project | https://docs.google.com/document/d/1JnCj9RGXUW1TSQRjG4MCBfQpyXdoUCkbWrDAo5FsFcw/edit?usp=sharing
● Performed a penetration test on megacorpone network with ONSIT technology using recon-ng. Vulnerabilities and recommended improvements to network security were all documented in a report using 5 effective phases such as Planning and reconnaissance, Scanning, exploitation and post exploitation.
● Tools: Recon-ng, Metasploit, Shodan, MITRE ATT&CK
Password Generator |
https://docs.google.com/presentation/d/1Vkl6qi9SxhoOK8Sgn8MkD7QXgta434SWRsJKwhfQVEQ/edit?usp=sharing
· A script capable of generating strong, random passwords that meet specified complexity requirements.
· Implement secure storage mechanism to securely store generated passwords.
· Enable easy retrieval and rotation of stored passwords.
· Integrate cryptographic libraries to ensure the security of password generation and storage.
· Implement authentication mechanism to protect the account.