Summary
Overview
Work History
Education
Skills
Projects
Languages
Timeline
Generic

LAVLEEN SEKHON

Brampton,Canada

Summary

Offering strong analytical abilities and passion for cybersecurity to proactively address security threats. Brings understanding of network protocols and threat mitigation strategies, with skills in risk assessment and vulnerability management. Dedicated to safeguarding organizational assets and ensuring data integrity.

Overview

1
1
year of professional experience

Work History

Sales Associate & Cashier

The Body Shop
08.2022 - 07.2023
  • Streamlined restocking processes for high-demand items, achieving an average shelf replenishment time of under 15 minutes per shift; maintained optimal inventory levels to enhance overall store efficiency.
  • Cultivated strong verbal skills through daily transactions and inquiries from diverse clientele, resulting in a personal average of five repeat customers per shift due to effective relationship-building strategies.
  • Streamlined the restocking process by implementing efficient inventory checks that reduced shelf replenishment time from an average of 30 minutes to just under 15 minutes per shift.
  • Strong work ethics and leadership skills
  • Delivered exceptional customer experiences through personalized sales approaches, resulting in a consistent 98% satisfaction rating from customers and fostering strong brand loyalty within the retail environment.

Education

No Degree - Cybersecurity Certificate

University of Toronto
Toronto, ON
09.2024

HBSc - Math and Computer Science

University of Toronto
Mississauga Campus, ON
06.2024

Skills

  • Python
  • Java
  • Linux
  • Kali
  • Windows
  • Microsoft Azure
  • Burp Suite
  • Snort
  • Hashcat
  • John the Ripper
  • Metasploit
  • Kiwi
  • Wireshark
  • Splunk
  • Autopsy
  • Phishing Awareness Training
  • Software Vulnerability Scanning
  • Multi-Factor Authentication
  • Vulnerability Assessment
  • Penetration Testing

Projects

Best Cybersecurity Practices for Individuals Project, https://docs.google.com/presentation/d/1RbkYgnjTevl0CnfsQoZ0q3OgzFeVjJyvcQP3oMNbh1s/edit#slide=id.p

  • Identified and addressed critical security vulnerabilities, specifically targeting password cracking, phishing tactics, and web security measures; developed actionable strategies that enhanced overall user safety for over 1,000 customers.
  • Analyzed and presented findings from a phishing campaign that identified the top three vulnerabilities within user behavior, leading to targeted training sessions for staff on enhanced cybersecurity awareness protocols.
  • Delivered an engaging presentation at Cybersecurity Bootcon, sharing insights and findings on the three biggest causes of phishing vulnerabilities, highlighting actionable strategies to enhance organizational security awareness across attendees.
  • My group and I used the tools John the Ripper, Zphishing, NetCraft.


Monitoring and Analyzing Attacks Project 

https://docs.google.com/presentation/d/1bqvzhYnC2sg_v7ND9iLN7G1sD-ZfGqvt6Lqe7qCRSa4/edit 

  • Developed a tailored security monitoring environment for the fictional organization VSI, enabling the successful identification and remediation of five critical vulnerabilities during simulated attack scenarios in a controlled setting.
  • Conducted thorough testing of a custom security monitoring environment against 10 distinct simulated attack scenarios, identifying vulnerabilities that enhanced system resilience and fortified overall cybersecurity protocols for the fictional organization.
  • Created an innovative Splunk-centric defense strategy tailored for fictional organization VSI; enhanced overall understanding by generating three actionable insights that addressed key vulnerabilities identified during simulated attack testing.


Penetration Test and Report Project 

https://docs.google.com/document/d/1VAdsBzwlkbko4FtoVXrgvCJKYTHIFiXr4LYtXebEXvw/edit 

  • As a Pen Tester, executed comprehensive vulnerability assessments across 15 key systems within Rekall’s network, resulting in actionable findings that addressed the most significant causes of security breaches and enhanced overall data protection.
  • Analyzed existing security measures of Rekall’s network architecture; findings led to immediate updates addressing three major areas of risk while maintaining operational efficiency throughout testing procedures.
  • Some of the tools include: Linux, Kali, Windows, Metasploit, MSFconsole, John the Ripper, Kiwi


Web Application Project 

https://docs.google.com/document/d/1BWPoRiYRgaV66vgW-S9BOFqM0ztWigzwL4VNHuDTjdU/edit 

  • Built, secured, and protected a cloud application that hosts my own cyber blog.
  • Role: Cloud Application Developer
  • Tools: HTML, Microsoft Azure, Security Measures (i.e. firewalls)

Languages

English
Native or Bilingual
French
Native or Bilingual
Punjabi
Native or Bilingual

Timeline

Sales Associate & Cashier

The Body Shop
08.2022 - 07.2023

No Degree - Cybersecurity Certificate

University of Toronto

HBSc - Math and Computer Science

University of Toronto
LAVLEEN SEKHON