Diverse experience in networking systems, network diagrams, databases, and cloud environments. Hands-on DevOps experience with AWS cloud platforms, gained through coursework and practical application. Highly detail-oriented with a proven ability to identify and resolve overlooked technical issues efficiently. Tech Savvy independently researches technical solutions to complement formal training. Proficient in related software, Microsoft Office 365, Azure, and Autopsy. Strong Foundation in Linux Systems: RedHat, Rocky, CAINE, Ubuntu, etc... Strong foundation in cloud computing, Digital Forensics and Malware Analysis. Relevant coursework includes Network Security, Cyber Threats and Mitigation, Cloud Computing, Offensive and Defensive Security, Cryptology, Cyberwarfare, and Digital Forensics. Developed a real response to an active RFP. (See Project Details) Recent graduate with excellent research, technical, and problem-solving skills. Detail-oriented and able to learn new concepts quickly. Dedicated and adaptable professional with a proactive attitude and the ability to learn quickly. Strong work ethic and effective communication skills. Eager to contribute to a dynamic team and support organizational goals.
Transportation System Framework: D.O.T. RFP – 044, Used NIST Benchmarks to design and build a cutting-edge hardening framework for vital transportation infrastructure in a variety of settings, including Linux/Windows servers, mobile field units, and onboard systems. Real-time audit and monitoring solutions were implemented, automatic compliance checks were incorporated, sophisticated access restrictions were enforced, and secure embedded device configurations were established. Secure boot, signed firmware, remote wipe, and application sandboxing techniques were used to guarantee resistance against contemporary threats.
Used NIST Benchmarks to design and build a cutting-edge hardening framework for vital transportation infrastructure in a variety of settings, including as Linux/Windows servers, mobile field units, and onboard systems. Real-time audit and monitoring solutions were implemented, automatic compliance checks were incorporated, sophisticated access restrictions were enforced, and secure embedded device configurations were established. Secure boot, signed firmware, remote wipe, and application sandboxing techniques were used to guarantee resistance against contemporary threats.