Banner Image

All Services

Other

Cyber Security Analyst

$60/hr Starting at $55

EDUCATION

University of Portsmouth, Portsmouth, United Kingdom             

MSc Cybersecurity and Forensic information Technology                                                                   2023 - 2024

  • Computer and Mobile Forensic Investigation & Cryptography: Conducted investigations using FTK, Autopsy, and Magnet Axiom, and presented a comprehensive report in court regarding the findings from the seizure. Good understanding of cryptographic controls (symmetric, asymmetric, and hashing algorithms) and various protocol analyses, including OSI, TCP, and IP models
  • Investigated and analysed security incidents to identify root causes and implement measures to prevent future occurrences using Wireshark
  • Developed knowledge in risk management, security strategies, and access control. Familiar with conducting risk assessments on critical systems, identifying and prioritizing security risks, and recommending mitigation strategies to reduce overall organizational risk.
  • Systems, Security and Hacking: Conducted vulnerability scans using Tenable Nessus, Acunetix and penetration tests through  Nmap, Hydra, Metasploit, Netcat, and SQL-Map
  • Cloud Computing: Implemented Virtualization (Virtual Box) using an Open Nebula to set the cloud infrastructure for users to have internal connectivity and also to the outside world (Project Link)
  • Actively stayed up-to-date with the latest security trends and technologies by attending industry conferences, webinars, and training sessions to enhance knowledge of emerging threats and develop the skills needed to mitigate them
  • Certified Ethical-Hacking (CEH) in progress

 

Masters Dissertation: Conducted empirical and data analysis, along with manual source code review, to identify vulnerabilities in WordPress plugin’s. Utilized Bash scripting to scrape website data for comprehensive analysis. The objective was to assess recurring patterns in vulnerability disclosures within WordPress plugins. Based on the findings, strategic recommendations were proposed to strengthen plugin security. Additionally, future research will explore the application of machine learning techniques, including linear regression and random forest models, to predict and mitigate potential vulnerabilities 

Skills: 

  • PLATFORMS: Linux Distribution (Ubuntu, Kali Linux, and Parrot Security OS), Windows (7,10,11,Server2008)
  • VIRTUALIZATION: Virtual Box, WEB APPLICATION: WEB Server (Apache) 
  • EXPLOITATION FRAMEWORK: Metasploit, Social-Engineer Toolkit ( SET )
  • PROTOCOLS: TCP/IP, UDP, SSH, TELNET, HTTP, HTTPS, DNS, SMTP, FTP, RDP, SNMP, Net Bios
  • PASSWORD CRACK: Hydra, Medusa, John the Ripper 
  • PORT/VULNERABILITY SCANNING: Nmap / Nessus, OpenVAS, NSE 
  • SNIFFING TOOL: Wireshark, Ettercap, ArpSpoof
  • FORENSIC TOOLS: FTK, Autopsy, Cellebrite, Magnet Axiom, XAMN 
  • SOFTWARE FIREWALL: IP Tables, Windows Firewall IDS: NIDS, HIDS | Honeypots 
  • DATABASE SECURITY: SQL Injection (SQL-Map, JSQL)
  • WEB APPLICATION TESTING TOOLS: Tenable Nessus, Acunetix, OWASP ZAP, Burp Suite

About

$60/hr Ongoing

Download Resume

EDUCATION

University of Portsmouth, Portsmouth, United Kingdom             

MSc Cybersecurity and Forensic information Technology                                                                   2023 - 2024

  • Computer and Mobile Forensic Investigation & Cryptography: Conducted investigations using FTK, Autopsy, and Magnet Axiom, and presented a comprehensive report in court regarding the findings from the seizure. Good understanding of cryptographic controls (symmetric, asymmetric, and hashing algorithms) and various protocol analyses, including OSI, TCP, and IP models
  • Investigated and analysed security incidents to identify root causes and implement measures to prevent future occurrences using Wireshark
  • Developed knowledge in risk management, security strategies, and access control. Familiar with conducting risk assessments on critical systems, identifying and prioritizing security risks, and recommending mitigation strategies to reduce overall organizational risk.
  • Systems, Security and Hacking: Conducted vulnerability scans using Tenable Nessus, Acunetix and penetration tests through  Nmap, Hydra, Metasploit, Netcat, and SQL-Map
  • Cloud Computing: Implemented Virtualization (Virtual Box) using an Open Nebula to set the cloud infrastructure for users to have internal connectivity and also to the outside world (Project Link)
  • Actively stayed up-to-date with the latest security trends and technologies by attending industry conferences, webinars, and training sessions to enhance knowledge of emerging threats and develop the skills needed to mitigate them
  • Certified Ethical-Hacking (CEH) in progress

 

Masters Dissertation: Conducted empirical and data analysis, along with manual source code review, to identify vulnerabilities in WordPress plugin’s. Utilized Bash scripting to scrape website data for comprehensive analysis. The objective was to assess recurring patterns in vulnerability disclosures within WordPress plugins. Based on the findings, strategic recommendations were proposed to strengthen plugin security. Additionally, future research will explore the application of machine learning techniques, including linear regression and random forest models, to predict and mitigate potential vulnerabilities 

Skills: 

  • PLATFORMS: Linux Distribution (Ubuntu, Kali Linux, and Parrot Security OS), Windows (7,10,11,Server2008)
  • VIRTUALIZATION: Virtual Box, WEB APPLICATION: WEB Server (Apache) 
  • EXPLOITATION FRAMEWORK: Metasploit, Social-Engineer Toolkit ( SET )
  • PROTOCOLS: TCP/IP, UDP, SSH, TELNET, HTTP, HTTPS, DNS, SMTP, FTP, RDP, SNMP, Net Bios
  • PASSWORD CRACK: Hydra, Medusa, John the Ripper 
  • PORT/VULNERABILITY SCANNING: Nmap / Nessus, OpenVAS, NSE 
  • SNIFFING TOOL: Wireshark, Ettercap, ArpSpoof
  • FORENSIC TOOLS: FTK, Autopsy, Cellebrite, Magnet Axiom, XAMN 
  • SOFTWARE FIREWALL: IP Tables, Windows Firewall IDS: NIDS, HIDS | Honeypots 
  • DATABASE SECURITY: SQL Injection (SQL-Map, JSQL)
  • WEB APPLICATION TESTING TOOLS: Tenable Nessus, Acunetix, OWASP ZAP, Burp Suite

Skills & Expertise

BashCyberIncideLinuxPeneSoc

0 Reviews

This Freelancer has not received any feedback.