Experienced IT and Cybersecurity Professional with over 15 years of hands-on experience in enterprise-level system monitoring, incident response, and technical support across hybrid environments (Windows, Linux, UNIX). Skilled in managing critical infrastructure, conducting root cause analysis, and promoting cross-departmental collaboration for 24/7 operational continuity. Currently pursuing a Master’s in Cybersecurity, with expertise in SIEM tools, system hardening, and network forensics. Seeking opportunities in IT operations, system administration, cybersecurity analysis, or technical support roles. Proficient in overseeing critical data center systems, focusing on server performance monitoring, incident response, and adherence to uptime standards for enterprise hardware.
Digital Forensic Investigation & Malware Analysis
- Conducted forensic investigation using tools such as Autopsy, Wireshark, and FTK Imager.
- Analyzed a compromised Windows system to extract artifacts, including event logs, deleted files, and registry entries.
- Used Hybrid Analysis and VirusTotal to examine malware behavior and identify Indicators of Compromise (IOCs).
- Collected digital evidence by chain-of-custody best practices.
- Generated forensic report outlining system breach timeline, malicious payloads, and attacker techniques.
- Applied ethical and legal considerations by cybersecurity laws and digital privacy principles.
Kali Linux Penetration Testing & Vulnerability Assessment
- Used Kali Linux tools including Nmap, Nikto, and OWASP ZAP to scan and assess vulnerabilities in a virtual lab environment.
- Enumerated open ports, services, and potential exploits on a Kioptrix VM target system.
- Conducted web application analysis using OWASP ZAP to detect SQL injections and XSS vulnerabilities.
- Documented findings and provided remediation steps in a formal vulnerability assessment report.
- Practiced ethical hacking principles and followed penetration testing methodologies aligned with the MITRE ATT&CK framework.
- Enhanced technical skills in reconnaissance, exploitation, and post-exploitation techniques within a sandboxed environment.roduct issue through consumer testing.
Digital Forensic Investigation & Malware Analysis
- Conducted forensic investigation using tools such as Autopsy, Wireshark, and FTK Imager.
- Analyzed a compromised Windows system to extract artifacts, including event logs, deleted files, and registry entries.
- Used Hybrid Analysis and VirusTotal to examine malware behavior and identify Indicators of Compromise (IOCs).
- Collected digital evidence by chain-of-custody best practices.
- Generated forensic report outlining system breach timeline, malicious payloads, and attacker techniques.
- Applied ethical and legal considerations by cybersecurity laws and digital privacy principles.
Kali Linux Penetration Testing & Vulnerability Assessment
- Used Kali Linux tools including Nmap, Nikto, and OWASP ZAP to scan and assess vulnerabilities in a virtual lab environment.
- Enumerated open ports, services, and potential exploits on a Kioptrix VM target system.
- Conducted web application analysis using OWASP ZAP to detect SQL injections and XSS vulnerabilities.
- Documented findings and provided remediation steps in a formal vulnerability assessment report.
- Practiced ethical hacking principles and followed penetration testing methodologies aligned with the MITRE ATT&CK framework.
- Enhanced technical skills in reconnaissance, exploitation, and post-exploitation techniques within a sandboxed environment.roduct issue through consumer testing.
Wireshark – Network traffic analysis
Splunk – Log and threat monitoring
Kali Linux – Ethical hacking and penetration testing
Nessus – Vulnerability scanning
Hybrid Analysis – Malware detection and file analysis
Active Directory – User and policy management
PowerShell – Scripting and task automation
VMware / Hyper-V – Virtual machine administration
ServiceNow – IT ticketing and service management
Microsoft Office Suite – Documentation and reporting
Windows Server 2019 – Server configuration and security
Linux (Ubuntu, CentOS) – System administration
Cybersecurity research and ethical hacking
Threat intelligence and digital forensics
Solving cyber puzzles and CTF challenges
Continuous learning and IT certifications
Mentoring women and youth in cybersecurity
Exploring emerging tech and innovation
Volunteering in STEM and faith-based outreach
Helping others grow spiritually and professionally
Bible study and faith-building activities
Quality time with family and children
Listening to gospel and inspirational music
Traveling and learning about new cultures