· Security Event and Incident Report - Conducted a digital forensic investigation using Wireshark, Visual Studio Code, Dradis, and PowerShell to identify indicators of compromise. Verified findings with VirusTotal scans and addressed challenges in log file correlation. Ensured compliance with industry standards and delivered comprehensive reports to my client.
· Security Assessment - Conducted a comprehensive vulnerability assessment of Windows and Linux operating systems using the OpenVAS tool to identify potential security weaknesses. Executed multiple scans on a Kali Linux virtual machine and a Windows Desktop virtual machine, uncovering 15 vulnerabilities, with two classified as medium and high severity. Provided actionable recommendations for mitigating risks, including software updates and secure session management practices.
· Cyber Threat Intelligence Report - Developed a comprehensive threat intelligence framework that integrated both commercial and open-source tools to enhance organizational security. Evaluated platforms such as AlienVault OTX, Cisco Talos, Maltego, and VirusTotal to ensure optimal threat detection and response capabilities. Implemented strategic monitoring practices, including Google Dorks, to identify vulnerabilities and strengthen overall cybersecurity measures.
· Penetration Testing Report - Engaged in a comprehensive penetration test of FICBANK for Spencer Whittingham, adhering to federal regulations and NIST standards. Conducted both automated and manual testing to identify vulnerabilities, assess security policy compliance, and evaluate employee awareness. Delivered detailed documentation of findings and recommended mitigation strategies to strengthen security posture.
· Forensic Analysis of an Intrusion Report- Led a comprehensive investigation into a significant security breach involving unauthorized access to a client's network, utilizing various forensic tools and methods. Identified key vulnerabilities, including the use of backdoor commands and scheduled tasks, which enabled the hacker to maintain persistent access.