Skills
Cybersecurity │ Network Design & Architecture │ Risk Management
Vulnerability Assessment │ Identity & Access Management │ Networking
Footprinting & Reconnaissance │ Network Tracerouting (Windows/Linux)
AI/ML Techniques │ IoT │ Cryptography │ Cloud Computing │ Disk Encryption
Programming & Scripting │ NetBIOS, SNMP, LDAP, NFS, DNS & SMTP Enumeration
Ethical Hacking & Penetration │ Google Hacking Techniques │ Information Gathering
ISCM │ System Administration │ Web Development │ Reports, Alerts & Dashboards
Malware Scanning & Threats │ Port & Process Monitoring │ Sniffing │ Social EngineeringCybersecurity │ Network Design & Architecture │ Risk Management
Vulnerability Assessment │ Identity & Access Management │ Networking
Footprinting & Reconnaissance │ Network Tracerouting (Windows/Linux)
AI/ML Techniques │ IoT │ Cryptography │ Cloud Computing │ Disk Encryption
Programming & Scripting │ NetBIOS, SNMP, LDAP, NFS, DNS & SMTP Enumeration
Ethical Hacking & Penetration │ Google Hacking Techniques │ Information Gathering
ISCM │ System Administration │ Web Development │ Reports, Alerts & Dashboards
Malware Scanning & Threats │ Port & Process Monitoring │ Sniffing │ Social Engineering
TECHNICAL SUMMARY
Netcat │ Burp Suite │ Nessus │ John the Ripper │ Metasploit │ SearchSploit │ Web Shells
SIEM │ Splunk │ SPL │ XSS Vulnerabilities & Payloads │ SQL Injection │ Zenmap │ Nmap
SAP │ Oracle │ Salesforce │ Adobe │ Microsoft Office │ Zendesk │ Athena │ HTML │ CSS
About
Motivated and hands-on cybersecurity professional with CEH and CompTIA Security+ certifications, actively pursuing a role as a Cybersecurity Analyst, SOC Analyst, or Information Security Analyst. I bring a strong foundation in threat detection, vulnerability assessment, incident response, and SOC operations strengthened through the completion of the University of Toronto’s Cybersecurity Bootcamp and the TryHackMe Security Analyst Level 1 pathway.
With a background in IT help desk and SaaS sales, I’ve developed a keen ability to troubleshoot issues quickly, communicate clearly with both technical and non-technical users, and prioritize security in high-pressure environments. My technical toolkit includes tools like Splunk, Nessus, Metasploit, Nmap, and Burp Suite alongside practical experience building secure environments, monitoring logs, scanning for threats, and resolving user issues.
Now seeking to join a cybersecurity team where I can apply my skills, continue learning, and contribute to defending organizations against evolving threats.