Best Cybersecurity Practices for Individuals Project, https://docs.google.com/presentation/d/1RbkYgnjTevl0CnfsQoZ0q3OgzFeVjJyvcQP3oMNbh1s/edit#slide=id.p
- Identified and addressed critical security vulnerabilities, specifically targeting password cracking, phishing tactics, and web security measures; developed actionable strategies that enhanced overall user safety for over 1,000 customers.
- Analyzed and presented findings from a phishing campaign that identified the top three vulnerabilities within user behavior, leading to targeted training sessions for staff on enhanced cybersecurity awareness protocols.
- Delivered an engaging presentation at Cybersecurity Bootcon, sharing insights and findings on the three biggest causes of phishing vulnerabilities, highlighting actionable strategies to enhance organizational security awareness across attendees.
- My group and I used the tools John the Ripper, Zphishing, NetCraft.
Monitoring and Analyzing Attacks Project
https://docs.google.com/presentation/d/1bqvzhYnC2sg_v7ND9iLN7G1sD-ZfGqvt6Lqe7qCRSa4/edit
- Developed a tailored security monitoring environment for the fictional organization VSI, enabling the successful identification and remediation of five critical vulnerabilities during simulated attack scenarios in a controlled setting.
- Conducted thorough testing of a custom security monitoring environment against 10 distinct simulated attack scenarios, identifying vulnerabilities that enhanced system resilience and fortified overall cybersecurity protocols for the fictional organization.
- Created an innovative Splunk-centric defense strategy tailored for fictional organization VSI; enhanced overall understanding by generating three actionable insights that addressed key vulnerabilities identified during simulated attack testing.
Penetration Test and Report Project
https://docs.google.com/document/d/1VAdsBzwlkbko4FtoVXrgvCJKYTHIFiXr4LYtXebEXvw/edit
- As a Pen Tester, executed comprehensive vulnerability assessments across 15 key systems within Rekall’s network, resulting in actionable findings that addressed the most significant causes of security breaches and enhanced overall data protection.
- Analyzed existing security measures of Rekall’s network architecture; findings led to immediate updates addressing three major areas of risk while maintaining operational efficiency throughout testing procedures.
- Some of the tools include: Linux, Kali, Windows, Metasploit, MSFconsole, John the Ripper, Kiwi
Web Application Project
https://docs.google.com/document/d/1BWPoRiYRgaV66vgW-S9BOFqM0ztWigzwL4VNHuDTjdU/edit
- Built, secured, and protected a cloud application that hosts my own cyber blog.
- Role: Cloud Application Developer
- Tools: HTML, Microsoft Azure, Security Measures (i.e. firewalls)