Summary
Overview
Work History
Education
Skills
Projects
Timeline
Generic

Rachida Karkach

San Antonio,Texas

Summary

Dedicated college student pursuing an A.A.S. in Information Assurance and Cybersecurity, with a solid foundation in networking, cybersecurity, and system administration. Seeking an internship to apply technical knowledge in a hands-on environment while contributing to a dynamic IT or cybersecurity team.

Overview

1
1
year of professional experience

Work History

Operator

tower semiconductor
San Antonio, TEXAS
01.2020 - 02.2021
  • Sorted product components on worktables to maintain maximum organization and productivity.
  • Attached are identification labels to finished packaged items or stamped lot numbers, and shipping destination information on containers.
  • Measured and weighed items to meet quality standards and prevent waste
  • Evaluated new products for compatibility with existing systems and processes
  • Documented daily production results accurately and completely
  • Troubleshoot mechanical problems with machines, making repairs or adjustments when necessary.

Education

Associate of Applied Science (A.A.S) - Information Assurance and Cybersecurity

San Antonio College
San Antonio, Texas
12.2025

Bachelor of Arts - English Language and Literature

Molay Ismail University
Morocco
06.2017

High School Diploma -

Foreign High School
Morocco
06.2014

Skills

  • Information Technology Security
  • Implementing and Supporting Servers
  • CCNA 2: Switching, Routing, and Wireless Essentials
  • Incident Response and Handling
  • Computer System Forensics
  • CCNA: Introduction to Networks
  • Linux Installation and Configuration
  • Firewalls and Network Security
  • CCNA 3: Enterprise Networking, Security, and Automation (upcoming)
  • Internship - Computer & Information Systems Security (upcoming)
  • Intrusion Detection (Upcoming)

Projects

Designing a Rule Base

  • Developed firewall rules to manage inbound and outbound traffic, enhancing network security.
  • Allowed and denied access based on specific IP addresses and ports, with detailed documentation of each rule

digital forensics analysis by analyzing USB

  • Conducted a comprehensive digital forensic analysis of a USB drive linked to suspected criminal activities.
  • Using autopsy and FTK imager to analyze the USB.
  • Analyze the evidence and make a written report.

Network Security Incident Analysis and Mitigation

  • Conducted an in-depth analysis of a security breach where an attacker exploited network services to gain unauthorized access and exfiltrate sensitive files.
  • Provided detailed recommendations for enhancing network defenses, including stronger access controls, intrusion detection systems, and regular security updates.

Wireless Access Point Research and Recommendation

  • Conducted an in-depth analysis of various wireless access points, evaluating their features, costs, and ideal use cases for home, business, and enterprise environments.
  • Recommended devices such as the Ubiquity Unify AP for business networks and the TP-Link Archer C80 for home use, balancing performance and cost-effectiveness.

Snort Rule Creation for SMB Attack Detection

  • Developed custom Snort rules to detect potential internal SMB over IP attacks targeting File Servers by monitoring specific network traffic patterns and payload content.
  • The rules trigger alerts for suspicious activity on designated IP ranges, enhancing internal network security monitoring.

Harassing Email Incident Investigation

  • Conducted a detailed investigation of harassing phishing emails targeting a university professor, utilizing packet capture analysis to identify the sender.
  • Provided recommendations for future incidents, including the importance of full email header analysis and network traffic monitoring to prevent unauthorized access and harassment.

2018 Winter Olympics Cyberattack   Analysis

  • Analyzed the root cause and response to the 2018 Pyeongchang Winter Olympics cyberattack, orchestrated by the Olympic Destroyer group.
  • Evaluated the organization's preparedness, identified missing security controls, and recommended improved cybersecurity measures, including stronger authentication and employee training.

iSCSI Storage and Failover   Clustering Configuration

  • Configured iSCSI storage and implemented a failover cluster using PowerShell commands to create virtual disks and establish highly available systems.
  • The project focused on securing iSCSI connections using IPsec and CHAP, ensuring encryption and data integrity, while differentiating between scale-out and traditional file server file shares.

Hyper-V Replica Implementation and   Failover Configuration

  • Configured Hyper-V Replica across host machines using PowerShell, enabling replication and validating failover for business continuity.
  • Demonstrated the procedure for failover and distinguished between planned and unplanned failover scenarios, ensuring minimal data loss and system recovery in case of virtual machine failures.

Establishing Performance Monitoring and Troubleshooting in Windows Server

  • Developed a comprehensive performance baseline for Windows Server by creating data collector sets, simulating typical workloads, and analyzing the collected data using Performance Monitor.
  • Utilized monitoring tools such as Task Manager, Resource Monitor, and Event Viewer to identify performance issues and implement troubleshooting techniques, enhancing system reliability and performance management.

Implementing Data Deduplication and Redundant Storage in Windows Server

  • Configured and implemented data deduplication to optimize storage efficiency by reducing duplicate files, resulting in significant space savings on the M: drive.
  • Established a redundant storage environment using iSCSI disks and created a three-way mirrored disk to enhance data availability and fault tolerance.

Timeline

Operator

tower semiconductor
01.2020 - 02.2021

Associate of Applied Science (A.A.S) - Information Assurance and Cybersecurity

San Antonio College

Bachelor of Arts - English Language and Literature

Molay Ismail University

High School Diploma -

Foreign High School
Rachida Karkach