Detail-oriented IT professional with over a year of experience providing technical assistance to users and resolving complex issues across diverse systems and applications. Possesses a strong foundation in troubleshooting, customer service, and incident management, with a growing focus on cybersecurity practices and principles. Proactively developing skills in network security, threat detection, and vulnerability assessment through continuous education. Committed to ensuring compliance with all procedures and regulations. Eager to transition into cybersecurity to contribute technical expertise and analytical skills toward securing systems and data against emerging threats.
Good understanding of:
Network Architecture and Infrastructure Concepts, IAM
Cyber kill chains, Diamond Model of Intrusion Analysis, MITRE ATT&CK
Threat Intelligence
Common Vulnerability Scoring System (CVSS) interpretation
Incident Response procedures,
SDLC and Software Vulnerability Mitigation
Exposure to the following tools:
Angry IP Scanner, Maltego
Burp Suite, OWASP, Zed Attack Proxy, Arachni, Nikto
Nessus, OpenVAS
Immunity debugger, GNU debugger
Nmap, Metasploit Framework, Wireshark, Recon-ng
Scout Suite, Prowler, Pacu