Passion + Application
A rare combination of coaching experience, human resources training, business management, and passion for information security has created the ultimate cybersecurity professional.
The following projects reflect an exceptional understanding and application of contemporary cybersecurity practices, policies, & principles.
The progression through these three scenarios reflects a wide variety of contemporary cybersecurity considerations: from technical controls and attack/mitigation tactics, to legal, ethical, cultural, and global concerns. The reader is invited to consider the great depth of learning that occurred to produce this document, the commitment, dedication, and passion for cybersecurity in all its iterations that is on full display.
In this scenario I was tasked with creating a training manual for IT employees of a fictional company. Relevant subjects include traffic analysis, firewalls, intrusion detection and prevention, network scanning/assessment, and log collection.
This project illustrates my ability to analyze a security breach, including topics such as incident response, impact, security test plans, and risk remediation.
This project is an in-depth analysis of a real-world data breach involving Twitter. It reflects my experience with cyber principles, case analysis, legal and ethical compliance, and global considerations.
This project reflects my ability to analyze and address potential vulnerabilities and security risks. Highlights include risk assessment and the creation of statements of policy.