Cybersecurity Enthusiast & Ethical Hacker
I am a motivated cybersecurity enthusiast with hands-on experience in penetration testing, ethical hacking, and cloud security. Proficient in network security, vulnerability assessment, and secure system architecture, I am eager to apply my technical expertise and problem-solving skills in a dynamic cybersecurity environment.
Currently pursuing a Diploma in Computer Science and Mathematics at Zetech University, I am actively engaged in CTF challenges, security research, and cybersecurity awareness programs.
Skills
Experience
Education
Certifications
Help Desk Technician → Cybersecurity Researcher
Independent Bug Bounty Hunter
Participated in Capture The Flag (CTF) competitions
Configured and secured a home office network, gaining hands-on
networking experience.
Implemented firewalls, VLANs, and security policies for secure
data transmission.
Applied best practices for network segmentation and access control
to enhance security posture.
Developed a local penetration testing environment using Docker
containers.
Deployed OWASP Juice Shop & DVWA for web security testing and
ethical hacking practice.
Created a controlled environment to safely practice exploitation
techniques and vulnerability assessment.
Implemented and monitored Splunk & Suricata for real-time
intrusion detection.
Analyzed network traffic & security logs to detect potential
threats.
Configured alerts and dashboards to provide comprehensive
visibility into security events.
Built secure, containerized environments using Docker &
Kubernetes.
Deployed test applications on AWS & Microsoft Azure, gaining
experience in cloud security best practices.
Implemented security controls and monitoring for cloud-based
infrastructure.
Analytical approach to identifying and resolving complex security
challenges.
Ability to think creatively when standard solutions don't apply.
Experience troubleshooting complex technical issues in
high-pressure environments.
Skilled at translating technical concepts into understandable
terms for non-technical stakeholders.
Experience documenting security findings and recommendations in
clear, actionable reports.
Ability to communicate effectively across different organizational
levels.
Experience working with cross-functional teams to implement
security solutions.
Ability to share knowledge and contribute to team objectives.
Collaborative approach to problem-solving and project
implementation.
Commitment to staying current with evolving cybersecurity threats
and technologies.
Ability to quickly learn and apply new tools and techniques.
Adaptable to changing priorities and requirements in dynamic
environments.
Copyright devoxomollo 2025