I’m a Cybersecurity Graduate Student with a foundation in Data Science and Risk Analysis. I’m passionate about strengthening organizational resilience through Governance, Risk, and Compliance (GRC) and Blue Team operations. My work combines analytical thinking, data-driven decision-making, and proactive defense to help organizations stay secure and compliant.
My background in data science and risk analysis has fueled my passion for cybersecurity. I am now eager to apply my analytical and technical skills in a cybersecurity internship, with a strong interest in Governance, Risk, and Compliance (GRC) as well as Blue Team/SOC operations to strengthen organizational security and resilience.
| Skill | AP |
|---|---|
| Programming Languages | Python, SQL, MySQL, SAS, R, HTML, SAS, C++, Golang, JavaScript, Bash, Automation Scripting |
| Operating Systems | Windows, Linux (Ubuntu), Mac OS |
| Cybersecurity & Risk | Security Operations, Security Compliance, Cloud Security, Risk Analysis, Threat Modeling, Security Architecture, OWASP Principles, Vulnerability Assessment |
| Networking & Protocols | Networking Fundamentals, TCP/IP, OSI Model, API Security |
| Security & Development Tools | Splunk (SEIM), Nmap, Wireshark, Postman, Git, Visual Studio, Microsoft Office Suite, Excel |
| Frameworks | NIST, GDPR, HIPAA, PCI DSS, ISO 27001, COBIT, SOC Type 2 |
| Cloud & Infrastructure | AWS, Azure |
| AI & Data Analysis | AI/ML Models, Data Validation, Predictive Analytics, Object-Oriented Design |
| Professional Skills | Analytical Thinking, Problem Solving, Communicaiton, Collaboration, Leadership |
Network Merger & Implementation Plan
- Designed and documented the consolidation of two corporate networks; prioritized seamless transition with security, risk mitigation, and performance in mind.
Commonwealth Bank Cybersecurity Risk Threat Management
- Performed a simulated cybersecurity assessment for Commonwealth Bank, analyzing threats and delivering actionable risk management insights.
Vulnerability Scanning of a Linux Target
- I conducted vulnerability scans using various network scanning tools such as nmap/zenmap and OpenVAS. I performed the first two steps in a pen testing process.