Information Security Professional
Information Security Professional
Passionate cybersecurity professional with 5+ years of experience in IT. Proficient in computer networking, web penetration testing, and DAST management. Fluent in scripting with Python, PowerShell, and Bash. Always ensuring robust defenses against evolving cyber threats. Focused on the future of Information Security through AI open-source models and fine-tuning data sets.
UPS / 2023-Present
UPS / 2020-2023
UPS / 2019-2020
TeamKCI / 2018-2019
The GIAC Web Application Penetration Tester (GWAPT) certification validates a practitioner's ability to better secure organizations through penetration testing and a thorough understanding of web application security issues. GWAPT certification holders have demonstrated knowledge of web application exploits and penetration testing methodology.
Earners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage wired and wireless networks found in companies around the world. CompTIA Network+ professionals have demonstrated the ability to design and implement functional networks, configure, manage, and maintain essential network devices, implement network security, and troubleshoot network problems.
The GIAC Security Essentials (GSEC) certification validates a practitioner's knowledge of information security beyond simple terminology and concepts. GSEC certification holders are demonstrating that they are qualified for hands-on IT systems roles with respect to security tasks.
More information available at Credly.
Engaging in projects is an exceptional method to delve into information technology. By immersing oneself in practical applications, individuals not only gain firsthand experience but also confront real-world challenges, fostering problem-solving skills and honing technical expertise. In essence, projects serve as invaluable learning laboratories, empowering individuals to grasp IT concepts comprehensively and apply them effectively in diverse contexts.
"Trashy" is a pre-built robotic arm integrated with a Raspberry Pi. Originally designed for manual control, I reconfigured it with custom code to autonomously detect and dispose of trash. By leveraging machine learning and the YOLOv3 algorithm, it discerns and picks up trash items exclusively, drawing from a trained dataset of 100 images. Positioned on my desk, Trashy diligently cleans up any wrappers it encounters, embodying efficiency and fun in waste management.
I embarked on a journey to enhance my understanding of both offensive security concepts and artificial intelligence through the fine-tuning of open-source Large Language Models (LLMs). Leveraging these powerful AI tools, I delved into the realm of offensive security information, refining and customizing the models to better grasp the intricacies of cybersecurity threats and tactics. This endeavor not only deepened my comprehension of AI methodologies but also provided invaluable insights into the evolving landscape of cybersecurity, equipping me with the knowledge and skills essential for navigating this complex domain effectively. My Offensive Security AI was trained with several offensive security resources using Mistral7b and can be launched and run via a Docker.
I recently undertook the exciting task of building my own home network from scratch, utilizing top-notch equipment from Unifi. Central to my setup was the Unifi Dream Machine Pro, a powerful all-in-one network appliance that served as the heart of my network infrastructure. Complementing this core component were Unifi's Access Points strategically placed throughout my home, ensuring seamless Wi-Fi coverage in every corner. To connect everything seamlessly, I crafted Cat5e cables myself, meticulously ensuring each connection was perfect. Additionally, I implemented a PiHole, further enhancing my network's performance by blocking unwanted ads and tracking domains at the DNS level. The result is a robust and reliable home network that delivers fast and stable internet connectivity to all my devices, fulfilling my desire for a modern and efficient networking solution.
I revitalized an aging HP DL580 server off a local seller, breathing new life into its hardware by transforming it into a versatile virtualization powerhouse. Equipped with the robust Proxmox Virtual Environment, I implemented several virtual machines, each tailored to host various operating systems, creating a dynamic ecosystem within a single physical entity. From Linux distributions to Windows servers, every OS found its home, leveraging the server's resources efficiently. This project not only breathed new life into obsolete hardware but also showcased the power of virtualization in optimizing resource utilization and fostering a versatile computing environment.