CompTIA Security+ (In Progress)
Lighthouse Labs Cybersecurity Diploma (September 2024)
Google Cybersecurity Certificate (2023)
Understanding the fundamentals of network and application security is essential in my cybersecurity toolkit. I am proficient in recognizing, intercepting, and neutralizing malicious attempts to infiltrate secure networks, ensuring the protection of organizational data.
Encryption is a key defense against cyber attacks like malware and ransomware. I have developed expertise in assessing and implementing encryption tools and protocols that safeguard sensitive information from brute-force attacks and unauthorized access.
When an incident occurs, a swift and thorough response is crucial. I am skilled in detecting and analyzing security incidents, utilizing modern exploitation techniques, and developing response plans to mitigate damage. I also have experience with incident reporting and developing strategies to prevent future occurrences.
Programming knowledge is a powerful asset in cybersecurity. I am proficient in writing batch and BASH scripts and have experience developing Python scripts to automate security tasks and address cybersecurity-specific challenges.
Cybersecurity forensics allows for a deep dive into understanding the nature of an attack. I have experience conducting post-attack autopsies, recovering digital evidence, and performing forensic investigations to identify vulnerabilities and reinforce defenses against future attacks.
Critical security controls are the backbone of an effective defense strategy. I am trained in identifying and utilizing the right technologies and methodologies to build a mature and resilient security posture, ensuring effective threat detection and response.
Communication is key when it comes to threat defense. I am well-versed in translating technical concepts like the MITRE ATT&CK Framework, Lockheed Martin Cyber Kill Chain, and dwell time into business-friendly language, bridging the gap between cybersecurity teams and decision-makers.
The Blue Team forms the foundation of a strong cybersecurity defense. I have experience building and optimizing security operations centers (SOC) and designing an effective organizational structure to monitor and manage an organization's security infrastructure.
With a focus on protecting and defending digital environments, I am prepared to help organizations stay ahead of evolving threats. Let’s connect and discuss how I can contribute to securing your digital assets.