About
Highly motivated Cybersecurity Analyst with over two years of hands-on experience in vulnerability management, endpoint security, application security, and log analysis. Adept at translating complex technical concepts into actionable insights for diverse stakeholders. Passionate about continuous learning and committed to enhancing organizational cyber resilience and safeguarding critical digital assets through proactive security measures and effective communication.
Work
Summary
Provided comprehensive cybersecurity training and mentorship, developing engaging learning materials and guiding students from foundational to advanced understanding.
Highlights
Conducted and delivered comprehensive tutoring sessions on cybersecurity topics and technologies, enhancing participant understanding.
Provided tailored support for coursework, projects, and complex challenges, fostering practical skill development.
Guided students from foundational to proficient understanding of cybersecurity concepts through personalized instruction.
Developed and curated engaging learning materials, resources, and assignments, significantly improving learning outcomes.
Summary
Conducted in-depth digital forensic investigations, recovering critical evidence and ensuring data integrity and chain of custody.
Highlights
Conducted in-depth forensic investigations of image drives, successfully recovering deleted files and critical evidence for active cases.
Utilized FTK Imager to recover hidden messages from multimedia files and create forensic disk images, ensuring data integrity for investigations.
Proficiently extracted critical files from corrupted disk images using advanced tools like Scalpel, Foremost, and Binwalk.
Performed comprehensive disk image analysis with Autopsy and The Sleuth Kit (TSK), extracting pertinent case-related information.
Ensured strict chain of custody and adherence to digital evidence preservation procedures, guaranteeing evidence integrity and court admissibility.
Summary
Enhanced cybersecurity posture through automation, vulnerability management, and secure coding practices, while also providing technical mentorship.
Highlights
Automated repetitive cybersecurity tasks using Bash scripting and Python, improving team efficiency by 30%.
Performed comprehensive vulnerability scans with Nessus, leading to the identification and mitigation of 95% of critical security threats.
Executed network interception and web application vulnerability assessments using Burp Suite and OWASP ZAP, resulting in a 40% reduction in web application vulnerabilities.
Applied secure coding practices, reducing code-based vulnerabilities by 60%.
Provided technical support and mentorship to new interns, enhancing satisfaction and streamlining the onboarding experience by 50%.
Volunteer
International Cyber Security and Digital Forensics Academy
|Student Mentor
Summary
Mentored new interns on critical Identity and Access Management (IAM) tasks, enhancing their practical cybersecurity skills.
Highlights
Mentored new interns on Identity and Access Management (IAM) tasks, including implementing 2FA on Linux with Google Authenticator, configuring SSH key-based authentication, and establishing robust login and password policies.
Community IT Support Initiative
|IT Automation Volunteer Lead
Summary
Led automation efforts for IT support and provided troubleshooting assistance, significantly improving efficiency and user satisfaction.
Highlights
Developed automation scripts for user issue resolution, reducing repetitive support tasks and enhancing operational efficiency.
Provided technical assistance and troubleshooting to non-technical users, improving user satisfaction and accelerating problem resolution.
Languages
English
Native
Skills
Security Tools
Nessus, Nmap, Metasploit, Burp Suite, OWASP ZAP, Splunk, Wazuh, Chronicle.
Digital Forensics Tools
Autopsy, The Sleuth Kit (TSK), FTK Imager, Scalpel.
Programming Languages
Python, Bash Scripting, PHP, MySQL.
Network Analysis
Wireshark, TCPdump.
Core Cybersecurity Skills
Application Security, Endpoint Security, Vulnerability Management, Log Analysis, Incident Response, Digital Evidence Preservation.
Soft Skills
Documentation, Effective Communication, Mentorship, Problem Solving, Technical Support.