Dynamic and results-driven cybersecurity professional with extensive knowledge in network security, ethical hacking, threat analysis, and risk management. Adept at identifying vulnerabilities, implementing security protocols, and designing comprehensive solutions to safeguard digital assets and sensitive information. Experienced in incident response, penetration testing, malware analysis, and developing proactive strategies to prevent cyber threats. Skilled in leveraging tools such as Wireshark, Python, Linux, and SIEM platforms to enhance system security and ensure compliance with industry standards. Proven problem-solver with strong analytical, documentation, and communication skills, capable of collaborating with cross-functional teams to streamline operations and implement security best practices. Committed to continuous learning, professional development, and staying ahead of emerging cybersecurity challenges while fostering secure and resilient IT environments.
Accomplished and highly motivated cybersecurity professional recognized as one of the top students in Weatherford College for outstanding academic performance and technical expertise. Demonstrated excellence in network security, ethical hacking, and threat analysis through hands-on projects, capture-the-flag competitions, and advanced cybersecurity labs. Gained practical industry experience as an intern at Brinker International, where responsibilities included assisting in IT security audits, monitoring network activity, and implementing risk mitigation strategies. Actively volunteers for Google, contributing to community-based technology initiatives, cybersecurity awareness programs, and collaborative problem-solving projects. Proven ability to apply theoretical knowledge to real-world environments, with strong skills in incident response, vulnerability assessment, penetration testing, and cybersecurity tool utilization. Recognized for leadership, teamwork, and effective communication, with a commitment to continuous learning, staying ahead of emerging threats, and promoting secure and resilient IT infrastructures.