Summary
Overview
Work History
Education
Skills
Timeline
Generic

Tewodros Bacha

Black Or African American,Maryland

Summary

My name is Tewodros Bacha. I am currently residing in Maryland with my wife and two children. In December 2021, I graduated with a Bachelor of Arts degree in Information Technology from Strayer University. I have a strong professional background with three years of experience in ethical hacking and penetration testing, having worked for the company ABCD in this capacity.

If there are specific details or aspects you would like to include or emphasize, feel free to let me know!

Overview

3
3
years of professional experience

Work History

Penetration Tester and Ethical Hacker

ABCD
04.2021 - Current

operating system proficient in Linux environment

Ubuntu:

Ubuntu is one of the most popular and user-friendly Linux distributions. It is based on Debian and comes with a vast community and extensive documentation. There are different flavors of Ubuntu, such as Ubuntu Desktop, Ubuntu Server, and variants like Kubuntu (KDE desktop), Xubuntu (Xfce desktop), etc.

Fedora:

Fedora is a community-supported distribution sponsored by Red Hat. It often includes the latest software and technologies, making it a good choice for developers and enthusiasts. Fedora uses the RPM package management system.

Debian:

Debian is known for its stability and reliability. It serves as the foundation for many other distributions, including Ubuntu. Debian uses the Debian Package Management system (DPKG) for software installation.

Arch Linux:

Arch Linux is a rolling release distribution known for its simplicity and customization options. It follows the "Arch Way" philosophy, providing a minimal base that users can build upon according to their preferences.

openSUSE:

openSUSE is a Linux distribution sponsored by SUSE. It offers both a rolling release version (Tumbleweed) and a more stable release (Leap). It uses the Zypper package manager.

CentOS:

CentOS (Community ENTerprise Operating System) is a free and open-source distribution derived from the sources of Red Hat Enterprise Linux (RHEL). It aims to provide a free and open alternative to RHEL.

Manjaro:

Manjaro is an Arch Linux-based distribution that aims to make Arch more accessible to a broader audience by providing a user-friendly installation process and pre-configured desktop environments.

Linux Mint:

Linux Mint is based on Ubuntu and Debian and is known for its user-friendly approach and out-of-the-box multimedia support. It comes with the Cinnamon, MATE, or Xfce desktop environments.

list specific cyber security skills such as threat analysis, vulnerability assessment, incident response


Network Security:

Firewall Management: Configuring and managing firewalls to control and monitor network traffic.

Intrusion Detection and Prevention Systems (IDPS): Deploying and managing systems that detect and prevent unauthorized access or malicious activities on a network.

Security Information and Event Management (SIEM):

SIEM Tools: Using SIEM platforms to aggregate, correlate, and analyze security events from various sources for effective threat detection and response.

Secure Coding Practices:

Application Security: Understanding and implementing secure coding practices to prevent vulnerabilities in software applications.

Code Review: Analyzing source code to identify and remediate security issues before they become vulnerabilities.

Security Awareness and Training:

User Education: Educating users about security best practices and raising awareness about potential threats like phishing and social engineering.

Compliance and Risk Management:

Risk Assessment: Identifying and assessing potential risks to an organization's information assets.

Compliance Management: Ensuring adherence to regulatory requirements and industry standards relevant to cybersecurity.

networking, understanding of networking protocols, firewalls and security best practices,

Networking Fundamentals:

TCP/IP Protocols: Understanding the suite of protocols that form the foundation of the Internet, including TCP (Transmission Control Protocol) and IP (Internet Protocol).

Subnetting and IP Addressing: Knowing how to subnet IP addresses and understanding the concepts of IPv4 and IPv6 addressing.

Routing and Switching: Familiarity with the principles of routing and switching in network infrastructure.

Networking Protocols:

HTTP/HTTPS (HyperText Transfer Protocol): Understanding the protocols used for web communication, including secure (HTTPS) and insecure (HTTP) variants.

DNS (Domain Name System): Understanding how DNS translates domain names to IP addresses and plays a crucial role in internet communication.

SMTP/POP3/IMAP (Simple Mail Transfer Protocol/Post Office Protocol/Internet Message Access Protocol): Protocols used for email communication.

FTP (File Transfer Protocol): Understanding the basics of file transfer over a network.

Firewalls:

Stateful and Stateless Firewalls: Understanding the differences between stateful and stateless firewalls and their roles in network security.

Packet Filtering: Knowing how firewalls analyze and filter network packets based on predefined rules.

Application Layer Firewalls: Understanding firewalls that operate at the application layer, providing more granular control over network traffic.

Security Best Practices:

Principle of Least Privilege: Ensuring that users and systems have the minimum level of access necessary to perform their functions.

Network Segmentation: Dividing a network into segments to contain and mitigate the impact of security incidents.

Regular Security Audits and Assessments: Conducting routine assessments to identify vulnerabilities and weaknesses in the network.

Patch Management: Keeping systems up-to-date with security patches to address known vulnerabilities.

Encryption: Implementing encryption protocols (e.g., SSL/TLS) to secure data in transit.

Security Awareness Training: Educating users about security threats and best practices to mitigate risks.

Intrusion Detection and Prevention Systems (IDPS):

Signature-Based and Anomaly-Based Detection: Understanding how IDPS can detect known patterns (signatures) and abnormal behavior in the network.

Response Mechanisms: Knowing how IDPS can automatically respond to detected threats or alert security personnel.

Virtual Private Networks (VPNs):

VPN Protocols: Understanding various VPN protocols (e.g., IPsec, SSL/TLS) used to establish secure communication over the internet.

Network Access Control (NAC):

NAC Policies: Implementing policies to control access to the network based on the security posture of devices.

Education

Bachelor of Arts - Information Technology

Strayer University
Washington, DC
12.2021

Skills

    Threat Analysis:

    Malware Analysis: Understanding and analyzing malicious software to identify its characteristics, behavior, and potential impact

    Threat Intelligence: Gathering and analyzing information about potential cyber threats, including understanding the tactics, techniques, and procedures (TTPs) of threat actors

    Anomaly Detection: Recognizing unusual patterns or behaviors in network traffic, system logs, or user activities that may indicate a security threat

    Vulnerability Assessment:

    Penetration Testing: Simulating cyber attacks to identify and exploit vulnerabilities in systems, networks, or applications to assess their security

    Security Assessment: Evaluating the security posture of systems and networks to identify weaknesses and recommend mitigations

    Vulnerability Scanning: Using automated tools to scan and identify vulnerabilities in software, systems, and networks

Timeline

Penetration Tester and Ethical Hacker

ABCD
04.2021 - Current

Bachelor of Arts - Information Technology

Strayer University
Tewodros Bacha