I am an ambitious professional with compliance experience, in-depth knowledge of intrusion detection/prevention systems and the ability to write custom scripts providing a wide range of security alerts, using security frameworks with a focus on risk mitigation, zero-day exploits, vulnerability management, and penetration testing. Identifying improved approaches and enhanced solutions to IT security challenges are activities that drive and inspire me. Exploration, pursuit, and motivation are my framework for success.
Skills
Hard Skills
- Machine learning
- Risk Mitigation
- Secure Software Development & Software
- Security Incident Handling & Response
- Engineering Practices
- Intrusion Detection / Prevention
- Text Editors
- Identity & Access Management
- Tenable Nessus
- Audit & Compliance
- Forensic Toolkit (FTK)
- SIEM Management: Splunk, MacAfee Nitro, LogRhythm, Qualys
- Volatility
- Access Data Registry Viewer
- Cloud Security: AWS, Google Cloud Platform (GCP)
- Spiderfoot
- Wireshark
- Risk Analysis
- OWASP/Zap
- Security Analysis
- Snort
- Data Analysis
- Mac OS
- Malware Analysis
- Microsoft
- Encryption
- Programming: Kali Linux, Phyton, Java, C++
- Virtualization: Kvm, VMware
- DNS: IPA, Bind
- Ethical Hacking
- Penetration testing
- Vulnerability management & Vulnerability assessment
- Digital Forensics / Computer Forensics
- Computer Networking
- Network security
- Automation / DevOps: Ansible
- Reverse Engineering
Soft Skills
- Communication skills
- Attention to detail
- Problem-solving
- Collaboration & teamwork
- Time management
- Creative thinking
- Interpersonal Skills
- Analytical and Diagnostic Skills
- Management Skills
Additional Information
- Orchestration and automation of three-tier system architecture on google cloud platform using "Ansible Playbook" (automation management tool). The first tier was a load balancer, there were three apache servers running as the second tier created on google cloud, and MySQL database was the third tier. The main goal was to automate the system to secure the server infrastructure. There are services behind the web application such as SSH and HTTP, I had to secure these services by hardening them. A simple PHP web application was designed to replicate the database table filled with sample contact information, where the load balancer distributes the PHP request as it comes in. All these had to be done once the Ansible playbook is been deployed to achieve acceleration, simplicity, productivity and overall system security.
- "Machine learning Application for Network Level Detection of Flooding (DDoS) Attacks", where I and my partner used a set of ML algorithms to classify a dataset into training and testing purposes, and applied the classified algorithm against some DDoS attacks to see the accuracy and precision level of the implemented algorithm in a network traffic.
- "Design and implementation of a vehicle monitoring system" where I developed a system from a microcontroller to monitor, track and record the positions of a vehicle in real-time via SMS message, and also record voices going on in and around the vehicle via a voice call. I also added and calibrated a smoke sensor to detect and alert the owner of the vehicle via SMS message of any possible fire outbreak in the car.
Activities and Honors
- Asis International - member
- National Society of Black Engineers (NSBE) - member
- Information System Audit and Control Association (ISACA) - member