Aspiring cybersecurity professional with a strong foundation in network security, ethical hacking, and digital forensics. Holds CCNA, ISC2 CC, and Google Cybersecurity Certificate, complemented by hands-on experience from labs, simulations, and CTF challenges. Passionate about threat detection, security operations, and vulnerability management, seeking an entry-level role in network security or SOC operations to apply skills and contribute to a proactive security team. Dedicated to continuous learning and staying ahead of evolving cyber threats in a fast-paced security landscape.
Technical Skills Cybersecurity & Security Operations Networking & Infrastructure Security Programming & Automation
ANZ
AIG
Secure Enterprise Network Design Email Header Analysis for Phishing Detection Web Exploitation Analysis (XSS, SQL Injection, IDOR, Command Injection)
🔹 Objective: Design and implement a secure enterprise network with VLAN segmentation, firewall rules, and IDS/IPS.
🔹 Tools & Technologies: Cisco Packet Tracer, fortiGate, Wireshark
🔹 Key Deliverables:
🔹 Objective: Analyze phishing emails and extract Indicators of Compromise (IOCs).
🔹 Tools & Technologies: Microsoft 365 Defender, Splunk, Wireshark
🔹 Key Deliverables:
🔹 Objective: Investigate web application vulnerabilities and their exploitation.
🔹 Tools & Technologies: Burp Suite, OWASP ZAP, Splunk
🔹 Key Deliverables: