IT Specialist in cybersecurity and data entry

Tutoring
Tutoring

Prepared notes, evaluated and kept track of student performances using Microsoft Office, Google sheets

Data Entry Specialist
Microsoft Office 365

Vulnerability Assessment
Vulnerability Assessment

Used in Nmap and Nessus to find vulnerabilities in a network and gave opinions on how they can remediate or mitigate depending on the goals of the organization

Cybersecurity

Threat Detection/Hunting
Threat Detection/Hunting

I monitored and analyzed network traffic as they traversed through a network to in order to find IOCs or threats and also uncovered how a network was exploited

Cybersecurity