Designing a Rule Base
- Developed firewall rules to manage inbound and outbound traffic, enhancing network security.
- Allowed and denied access based on specific IP addresses and ports, with detailed documentation of each rule
digital forensics analysis by analyzing USB
- Conducted a comprehensive digital forensic analysis of a USB drive linked to suspected criminal activities.
- Using autopsy and FTK imager to analyze the USB.
- Analyze the evidence and make a written report.
Network Security Incident Analysis and Mitigation
- Conducted an in-depth analysis of a security breach where an attacker exploited network services to gain unauthorized access and exfiltrate sensitive files.
- Provided detailed recommendations for enhancing network defenses, including stronger access controls, intrusion detection systems, and regular security updates.
Wireless Access Point Research and Recommendation
- Conducted an in-depth analysis of various wireless access points, evaluating their features, costs, and ideal use cases for home, business, and enterprise environments.
- Recommended devices such as the Ubiquity Unify AP for business networks and the TP-Link Archer C80 for home use, balancing performance and cost-effectiveness.
Snort Rule Creation for SMB Attack Detection
- Developed custom Snort rules to detect potential internal SMB over IP attacks targeting File Servers by monitoring specific network traffic patterns and payload content.
- The rules trigger alerts for suspicious activity on designated IP ranges, enhancing internal network security monitoring.
Harassing Email Incident Investigation
- Conducted a detailed investigation of harassing phishing emails targeting a university professor, utilizing packet capture analysis to identify the sender.
- Provided recommendations for future incidents, including the importance of full email header analysis and network traffic monitoring to prevent unauthorized access and harassment.
2018 Winter Olympics Cyberattack Analysis
- Analyzed the root cause and response to the 2018 Pyeongchang Winter Olympics cyberattack, orchestrated by the Olympic Destroyer group.
- Evaluated the organization's preparedness, identified missing security controls, and recommended improved cybersecurity measures, including stronger authentication and employee training.
iSCSI Storage and Failover Clustering Configuration
- Configured iSCSI storage and implemented a failover cluster using PowerShell commands to create virtual disks and establish highly available systems.
- The project focused on securing iSCSI connections using IPsec and CHAP, ensuring encryption and data integrity, while differentiating between scale-out and traditional file server file shares.
Hyper-V Replica Implementation and Failover Configuration
- Configured Hyper-V Replica across host machines using PowerShell, enabling replication and validating failover for business continuity.
- Demonstrated the procedure for failover and distinguished between planned and unplanned failover scenarios, ensuring minimal data loss and system recovery in case of virtual machine failures.
Establishing Performance Monitoring and Troubleshooting in Windows Server
- Developed a comprehensive performance baseline for Windows Server by creating data collector sets, simulating typical workloads, and analyzing the collected data using Performance Monitor.
- Utilized monitoring tools such as Task Manager, Resource Monitor, and Event Viewer to identify performance issues and implement troubleshooting techniques, enhancing system reliability and performance management.
Implementing Data Deduplication and Redundant Storage in Windows Server
- Configured and implemented data deduplication to optimize storage efficiency by reducing duplicate files, resulting in significant space savings on the M: drive.
- Established a redundant storage environment using iSCSI disks and created a three-way mirrored disk to enhance data availability and fault tolerance.