top of page

Skills

  • Networking: In my networking journey, I've developed a foundational understanding of the OSI and TCP/IP models, which has provided me with a solid groundwork for comprehending network architectures. Through hands-on experience configuring CISCO IOS CLI, I've gained proficiency in basic tasks such as setting up IP addresses, hostnames, and duplex settings to optimize network speeds for effective communication. Identifying and resolving configuration issues using packet analyzers is a skill I've begun to hone, allowing me to diagnose and address network hiccups swiftly. Whether constructing networks from scratch or refining existing infrastructures, I demonstrate competence in subnetting to ensure efficient resource allocation based on the number of hosts and networks required. I am also beginning to grasp the concept of reverse subnetting, an essential skill for identifying and resolving potential network-related issues. My foundational knowledge extends to configuring VLANs for improved network segmentation and security. Additionally, I'm developing my ability to convert decimal to binary and vice versa, enabling me to navigate diverse networking environments accurately and efficiently. With a growing passion for networking and a budding knack for troubleshooting, I'm eager to confront any networking challenge head-on and drive meaningful results.

  • Information Security: I have an intermediate understanding of information security principles, focusing on maintaining the confidentiality, integrity, and availability of digital assets. Recognizing the importance of safeguarding sensitive information in today's interconnected world, I am motivated to stay updated on evolving security threats and trends. Understanding the dynamic nature of cyber threats, I emphasize the need to adapt security measures proactively to mitigate risks effectively. Through continuous monitoring of emerging threats and vulnerabilities, I aim to anticipate and address potential security challenges before they can compromise systems or data. My passion lies in implementing basic security measures across network infrastructures, applications, and data repositories. This includes tasks such as implementing encryption protocols for data in transit, deploying basic intrusion detection systems to identify suspicious activities, and enforcing basic access controls to prevent unauthorized access. I prioritize the establishment of fundamental security defenses to ensure the protection of digital assets.

  • Cybersecurity Tools: I've gained invaluable hands-on experience with a diverse suite of cybersecurity tools that are essential for conducting penetration testing and vulnerability assessments. Among these tools, I've developed my skills with Burp Suite, Metasploit, Nmap, Wireshark, and Dirbuster, learning their functionalities and leveraging them to strengthen my understanding of cybersecurity concepts.

  • Problem-solving: I have honed my collaborative and adaptive mindset, making me a valuable addition to any team. I enjoy working with others to develop solutions in real-time, troubleshoot complex issues, and adapt to new challenges. My proven ability to collaborate with leadership and team members to develop swift and effective solutions sets me apart from others in the field. I am excited to take on new challenges and bring my adaptable and collaborative approach to any setting.

  • Cloud Computing: I have developed a foundational understanding of cloud security principles and practices. I know how to secure data and applications in cloud environments, and I can ensure a secure and compliant computing infrastructure. I am passionate about staying up-to-date on the latest developments in cloud technology, and I thrive in fast-paced, dynamic environments.

bottom of page