Summary
Overview
Work History
Education
Skills
Certification
Projects
Timeline
Generic

Winston Ighodaro

Baltimore,Maryland

Summary

Dynamic and results-oriented Ethical Hacker with a proven track record of safeguarding organizations against cyber threats through meticulous penetration testing and vulnerability assessments. Possessing a comprehensive understanding of offensive security methodologies and best practices, excels in identifying and exploiting weaknesses in networks, systems, and applications to fortify defenses and mitigate risks. With hands-on experience in exploit development, malware analysis, and forensic investigation, adept at delivering actionable insights and recommendations to enhance cybersecurity postures. Collaborative and detail-oriented, thrives in fast-paced environments, leveraging advanced tools and techniques to stay ahead of evolving cyber threats and protect critical assets. Passionate about continuous learning and staying abreast of emerging technologies, committed to driving innovation and excellence in cybersecurity practices to ensure the integrity, confidentiality, and availability of sensitive information.

Overview

3
3
years of professional experience
4
4
Certification

Work History

Senior Ethical Hacker | Penetration Testing Lead

Toyz Electronics, LLC
01.2023 - Current
  • Lead a team of ethical hackers and penetration testers in conducting comprehensive security assessments and red team engagements for global enterprise clients across various industries.
  • Design and execute advanced penetration testing methodologies, leveraging both manual techniques and automated tools, to identify and exploit vulnerabilities in clients' networks, applications, and cloud environments.
  • Provide expert guidance and mentorship to junior team members, fostering their professional growth and development in the field of ethical hacking and cybersecurity.
  • Serve as a trusted advisor to clients, delivering executive-level briefings and reports on assessment findings, risk prioritization, and recommended mitigation strategies.
  • Continuously research emerging threats and attack techniques, contributing to the company's thought leadership in cybersecurity through white papers, conference presentations, and industry collaborations.

Intern Ethical Hacker

BlueSteel Cybersecurity
04.2022 - 06.2023
  • Participated in penetration testing engagements under the guidance of senior ethical hackers, focusing on identifying and exploiting vulnerabilities in client systems and applications.
  • Conducted thorough security assessments of web applications, networks, and infrastructure using a variety of tools and techniques, including vulnerability scanners, network sniffers, and exploit frameworks.
  • Assisted in the development of detailed reports outlining findings, risk prioritization, and recommendations for remediation to enhance clients' security posture.
  • Collaborated with cross-functional teams to simulate real-world attack scenarios and assess the effectiveness of defensive measures.
  • Actively contributed to team discussions and brainstorming sessions to explore innovative approaches and methodologies for ethical hacking and cybersecurity.

Penetration Tester | Cybersecurity Analyst

BreachLock
06.2021 - 06.2022
  • Perform in-depth vulnerability assessments and penetration tests on clients' networks, web applications, and infrastructure to identify and exploit security weaknesses.
  • Develop and execute custom attack scenarios, including social engineering, phishing campaigns, and wireless network attacks, to assess clients' resilience to targeted threats.
  • Provide actionable recommendations and remediation strategies to clients based on assessment findings, helping them prioritize and address critical security issues.
  • Collaborate with cross-functional teams, including developers, system administrators, and executives, to implement security best practices and mitigate identified risks.
  • Contribute to the development of proprietary tools and methodologies for ethical hacking and security testing, enhancing the company's capabilities and competitiveness in the cybersecurity market.

Education

Cybersecurity and Assurance in Cybersecurity -

Baltimore City Community College
Baltimore, MD
02.2024

Skills

  • Proficiency in conducting penetration tests to identify and exploit vulnerabilities in networks, systems, and applications
  • Familiarity with common web vulnerabilities (eg, SQL injection, Cross-Site Scripting) and techniques for securing web applications and APIs
  • Ability to perform comprehensive vulnerability assessments to identify security weaknesses and recommend remediation measures
  • Proven ability to reverse engineer code, malware, and malicious software
  • Skilled in identifying and exploiting weaknesses in computer networks and systems
  • Knowledge of social engineering tactics and techniques used to manipulate individuals into divulging confidential information or performing unauthorized actions
  • Familiarity with lots of security tools and utilities used in ethical hacking, including penetration testing frameworks (eg, Metasploit), network scanners, packet analyzers, and intrusion detection systems
  • Proficiency in forensic investigation techniques and tools to analyze digital evidence, identify security incidents, and attribute cyber threats

Certification

  • Security+, 08/01/23, CompTIA.
  • Network+, 09/01/23, CompTIA.
  • Pentest+, 11/01/23, CompTIA.
  • Network Vulnerability Assessment Professional, 11/01/23, CompTIA.

Projects

Ghost-Hunter

I have recently developed a tool with python programming language called Ghost-Hunter that is specifically designed to assist Penetration Testers in their work. This script proves to be highly useful when it comes to tracking the phone numbers and usernames of potential victims across various social media platforms, as well as locating their IP addresses. By utilizing this script, testers can efficiently gather information and gain valuable insights during their assessment process. With its user-friendly interface and robust functionality, this Python script streamlines the task of tracking and identifying crucial details about individuals, facilitating more accurate and comprehensive penetration testing.

Social Engineering Test

I conducted an Ethical Hacking project where I implemented a Social Engineering attack on the Chief Security Officer of a company with consent. Through this attack, I successfully obtained valuable information about the company and managed to hack into the victims camera. This allowed me to assess not only the live feed from the camera, but also obtain the location of the victim, furthermore, I was able to extract important credentials that were essential for the companies security system. This project highlighted vulnerabilities in the companies security measures and provided valuable insight for improving their overall Cyber Security. Ethical Hacking projects like these play a crucial role in identifying and rectifying potential security breaches, ultimately enhancing the protection of sensitive information.

WI-FI DE-authentication

I have recently developed a Python script specifically designed for ethical hackers who want to enhance their Wi-Fi network security. This script serves the purpose of DE authenticating Wi-Fi networks, providing a valuable tool for penetration testers and security professionals. By leveraging the power of Python, this script offers an efficient and effective solution. However, it is important to note that in order to run the script, a Wi-Fi adapter is required. This adapter acts as a crucial component in the execution of the DE authentication process. With this script at hand, Ethical Hackers can now further investigate the vulnerabilities present in Wi-Fi networks, ultimately ensuring their clients' networks are adequately protected from potential threats.

Information Security

I led the Red Team in a Red Team vs Blue Team exercise to breach the security of the blue team using a variety of techniques and tools to exploit gaps within the security architecture. I also collaborated with the blue team to identify weaknesses in their security infrastructure and helped them to improve their security posture. Demonstrated expertise in offensive security and Ethical Hacking, as well as experience in detecting and containing attacks, developing response plans and procedures, and building experience in network security. Utilized tools and techniques such as web app scanning, digital forensics, and black box testing to simulate attacks against the blue team and test the effectiveness of their network's security.

Password Generator

I have developed a password generator script which aims to assist users in creating secure and robust passwords for free. The script generates random combinations of characters, numbers, and symbols, ensuring that the passwords are highly resistant to hacking attempts. To enhance user convenience, the script allows them to save the generated passwords directly to their desktop and can be encrypted by the user. This script ensures that the passwords are easily accessible when needed, while also promoting the habit of regularly updating and changing passwords for increased security. With this password generator script, users can confidently create strong passwords without the hassle of coming up with complex combinations themselves. The script is written in python, and it uses the input of users to generate strong passwords that cannot be easily cracked by hackers.

Timeline

Senior Ethical Hacker | Penetration Testing Lead

Toyz Electronics, LLC
01.2023 - Current

Intern Ethical Hacker

BlueSteel Cybersecurity
04.2022 - 06.2023

Penetration Tester | Cybersecurity Analyst

BreachLock
06.2021 - 06.2022

Cybersecurity and Assurance in Cybersecurity -

Baltimore City Community College
Winston Ighodaro