Summary
Work History
Education
Skills
Timeline
Hi, I’m

Tony Drumright

Clifton,NJ

Summary

As an aspiring IT professional with a strong focus on cybersecurity and network administration, I bring a blend of academic knowledge and practical experience. Currently pursuing a BA in Information Technology with a minor in Computer Forensics at Fairleigh Dickinson University, my education complements my hands-on skills in system security, network management, and cloud networking.

Work History

Anaylizing Home Security

Job overview

  • I started the refurbishment of an outdated computer and repurposed it for a home server, updating software, upgrading hardware, and troubleshooting for enhanced functionality
  • Conducted comprehensive vulnerability assessments and managed network security hardening through penetration testing
  • Implemented and maintained a SIEM system with Elasticsearch, Kibana, and Suricata for improved network traffic analysis and security monitoring
  • Developed and executed a patch management strategy to address identified network vulnerabilities.

Home Vitrual Network Administration

Job overview

  • Configured and managed virtual environments using VirtualBox for testing and deploying security tools
  • Oversaw the setup and administration of a home server for network security management, backup storage, and web hosting
  • Utilized AWS Cloud services (EC2, S3, RDS, Lambda) for scalable and efficient cloud-based solutions
  • Integrated ZEEK into SIEM setups for advanced network analysis and real-time monitoring.

Education

Fairleigh Dickinson University

BA in Information Technology (In Progress, Expected May 2023) Minor in Computer Forensics
05-2024

University Overview

  • Additional Coursework in

Computers & Computer Software (CSCI_1105)

Technical Communications (EGTG_2210)

Computer Programming for Info-Tech I & II (INFO_2101, INFO_2102)

Internet and Web Applications (INFO_2105)

Digital System Design (ENGR_2286)

Database Systems (CSCI_3268)

Human-Computer Interface (INFO_3201)

File System Forensic Analysis & Investigation (CRIM_3327)

Data Communications & Computer Networks I (INFO_4101_51)

Linux System Administration (CSCI_3274_51)

Skills

  • Developed a vulnerability patch management solution for an IT enterprise environment, focusing on workstations and server security
  • Successfully set up and utilized a SIEM (Security Information and Event Management) system, involving tools such as Elasticsearch, Kibana, and Suricata
  • Conducted web application security assessments using Burp Suite and performed intelligence gathering and data analysis with Maltego
  • Troubleshot and resolved Elastic Heartbeat setup issues on a Mac, emphasizing authentication and configuration for successful SIEM deployment
  • Refurbished an older computer to serve as a home server, focusing on Windows 11 compatibility, Linux distribution installations, and enhancing system robustness
  • Configured honeypots and Intrusion Detection Systems (IDS) using Cowrie and Suricata on CentOS, addressing installation and configuration challenges
  • Executed network monitoring and threat detection on Windows using KFSensor, troubleshooting common software issues
  • Experienced in virtualization tools like VirtualBox for running multiple OS environments
  • Skilled in configuring and managing AWS Cloud services such as EC2, S3, RDS, Lambda, and Elastic Beanstalk
  • Utilized AWS CloudWatch for real-time monitoring and logging of network traffic
  • Integrated ZEEK (formerly Bro) into SIEM setups for enhanced network analysis
  • Gained expertise in cloud architecture principles and services, emphasizing scalability, flexibility, and cost-efficiency of AWS solutions
  • Developed a strong foundation in network security concepts, including intrusion detection with Snort and network vulnerability assessments using Nmap
  • Hands-on experience with cybersecurity tools for penetration testing, vulnerability analysis, and network security management
  • Emphasized the importance of regular network assessments, continuous monitoring, and employing best practices in network security
  • Documentation & Reporting: Technical writing, process documentation, security analysis, and recommendations

Timeline

Anaylizing Home Security

Home Vitrual Network Administration

Fairleigh Dickinson University

BA in Information Technology (In Progress, Expected May 2023) Minor in Computer Forensics
Tony Drumright