Technical Skills

Technical Skills & Capabilities

Building a Strong Foundation Through Hands-On Learning

As an aspiring cybersecurity professional, I’ve invested hundreds of hours developing practical technical skills through self-directed learning, lab environments, and certification training. While I’m seeking my first professional role, I’ve built a solid technical foundation across key security domains.


Core Security Competencies

Network Security Fundamentals

Through TryHackMe labs and home lab practice, I’ve developed foundational skills in:

  • Network Analysis: Packet capture and analysis using Wireshark and tcpdump to identify malicious traffic patterns
  • Network Scanning: Proficient with Nmap for network reconnaissance and service enumeration
  • Firewall Configuration: Hands-on experience with pfSense and basic iptables rule creation
  • Network Protocols: Strong understanding of TCP/IP, DNS, HTTP/HTTPS, and common network services
  • Network Segmentation: Implemented VLANs in home lab environment for security practice
  • VPN Technologies: Configured OpenVPN and WireGuard for secure remote access

Practical Application: Built a home network lab to practice network security concepts and attack/defense scenarios


Vulnerability Assessment & Management

Skills developed through TryHackMe, Hack The Box, and personal projects:

  • Vulnerability Scanning: Hands-on experience with Nmap, OpenVAS, and Nikto for identifying security weaknesses
  • OWASP Top 10: Practical knowledge of common web vulnerabilities (SQL injection, XSS, CSRF, broken authentication)
  • Vulnerability Analysis: Ability to assess CVE severity using CVSS scoring and prioritize remediation
  • Exploit Research: Familiarity with searchsploit and Exploit-DB for vulnerability research
  • Security Reporting: Experience documenting findings with risk ratings and remediation recommendations

Hands-On Practice: Completed 150+ TryHackMe rooms and 20+ Hack The Box machines focusing on vulnerability discovery


Operating Systems & Administration

Linux

  • Command-line proficiency with bash scripting for security automation
  • User and permission management, file system security
  • Log analysis and system monitoring
  • Experience with Kali Linux, Ubuntu, and Parrot Security OS

Windows

  • Active Directory fundamentals and user management concepts
  • PowerShell basics for security tasks
  • Understanding of Windows security features (BitLocker, Windows Defender, UAC)
  • Event log analysis for security monitoring

Penetration Testing & Offensive Security

Knowledge and skills developed through CTF challenges and practice environments:

Reconnaissance & Enumeration

  • Information gathering using OSINT techniques
  • DNS enumeration, subdomain discovery, and web reconnaissance
  • Service enumeration and banner grabbing

Exploitation Techniques

  • Basic exploitation using Metasploit Framework
  • Manual exploitation of common vulnerabilities
  • Understanding of privilege escalation techniques (Linux and Windows)
  • Web application penetration testing methodologies

Tools Proficiency

  • Burp Suite (Community Edition) for web application testing
  • Metasploit for exploitation and post-exploitation
  • John the Ripper and Hashcat for password cracking
  • SQLmap for automated SQL injection testing
  • Hydra for brute-force attacks

Active Learning: Currently ranked: Top 10% on TryHackMe with focus on offensive security paths


Cloud Security Fundamentals

Foundation in cloud security through AWS learning and certification preparation:

  • AWS Basics: Understanding of EC2, S3, IAM, VPC, and CloudTrail
  • IAM Best Practices: Implementing least privilege and multi-factor authentication
  • Security Groups & NACLs: Configuring network access controls in cloud environments
  • Cloud Monitoring: Familiarity with CloudWatch and basic log analysis
  • Security Compliance: Understanding of cloud security frameworks and best practices

Certification: Preparing for AWS Cloud Practitioner certification


Security Tools & Technologies

SIEM & Log Analysis

  • Theoretical knowledge of SIEM concepts from Security+ training
  • Hands-on experience with Splunk (free tier) for log analysis
  • Basic understanding of security event correlation and alerting

Security Monitoring

  • Familiarity with Snort and Suricata for intrusion detection
  • Experience with Security Onion in lab environment
  • Understanding of security monitoring workflows

Endpoint Security

  • Knowledge of EDR/AV concepts and deployment
  • Familiarity with Windows Defender and endpoint hardening

Scripting & Automation

Python (Intermediate)

  • Security tool automation and workflow scripting
  • API interaction and data parsing
  • Basic exploit development understanding

Bash/Shell (Intermediate)

  • Automation of security tasks and system administration
  • Log parsing and analysis scripts
  • Integration of multiple security tools

PowerShell (Beginner)

  • Basic Windows automation and security tasks
  • Active Directory enumeration scripts

Projects: Created automated vulnerability scanning script integrating multiple tools (available on GitHub)


Compliance & Frameworks Knowledge

Through Security+ and self-study, I’ve developed understanding of:

  • NIST Cybersecurity Framework: Core functions and practical implementation
  • HIPAA: Healthcare data protection requirements
  • PCI DSS: Payment card security standards basics
  • GDPR: Data privacy regulation fundamentals
  • Security Controls: NIST 800-53 and CIS Controls familiarity

Certifications

CompTIA Security+ – Validated foundation in security concepts, threats, and best practices
ISC² Certified in Cybersecurity (CC) – Entry-level security professional certification
🎯 In Progress: Master’s degree in Cybersecurity and Information Assurance
🎯 Planned: AWS Certified Cloud Practitioner, CompTIA CySA+


Additional Technical Skills

Documentation & Reporting

  • Technical writing and vulnerability report creation
  • Creating security documentation and standard operating procedures
  • Presentation of technical findings to different audiences

Incident Response Basics

  • Understanding of incident response lifecycle
  • Basic malware analysis in isolated environments
  • Digital forensics fundamentals

Cryptography

  • Understanding of encryption algorithms and applications
  • PKI concepts and certificate management
  • Secure communication protocols

Hands-On Learning Platforms

TryHackMe

  • Rank: current 187186/top 10%
  • Rooms Completed: 38, covering offensive security, defensive security, and security fundamentals
  • Focus Areas: Web exploitation, privilege escalation, network security, OWASP Top 10

Hack The Box

  • Machines Pwned: 24, inactive for a while.
  • Focus on realistic penetration testing scenarios
  • Active participation in seasonal challenges

Additional Practice

  • PentesterLab for web application security
  • OverTheWire wargames for Linux fundamentals
  • picoCTF and other beginner-friendly CTF platforms

Soft Skills That Complement Technical Abilities

Analytical Thinking

  • Scientific training from biotechnology background enhances systematic problem-solving
  • Methodical approach to security analysis and troubleshooting

Communication

  • Ability to explain technical concepts to non-technical audiences
  • Experience creating clear, concise documentation
  • Comfortable presenting findings and recommendations

Self-Motivated Learning

  • Demonstrated commitment through self-funded certifications and training
  • Proactive skill development through labs and CTF participation
  • Stay current with security news, vulnerabilities, and threat intelligence

Adaptability

  • Quick learner comfortable with new tools and technologies
  • Successfully transitioned from biotechnology to cybersecurity domain
  • Embrace challenges and learning opportunities

Current Focus & Growth Areas

I’m actively expanding my skills in:

Advanced Penetration Testing: Working through OSCP-style preparation materials
Cloud Security: Deepening AWS security knowledge and pursuing additional cloud certifications
Blue Team Skills: Building SOC analyst capabilities through SIEM and log analysis practice
Threat Intelligence: Learning to identify, analyze, and respond to emerging threats
Security Automation: Developing Python scripts for security workflow automation


How I Can Contribute to Your Team

Despite being entry-level, I offer:

🎯 Solid Foundation: Industry-recognized certifications validate my core security knowledge
🎯 Hands-On Experience: Hundreds of hours of practical lab work and CTF challenges
🎯 Learning Mindset: Proven ability to quickly acquire new skills and adapt to new technologies
🎯 Technical Writing: Strong documentation skills for reports, procedures, and findings
🎯 Fresh Perspective: Up-to-date knowledge of current tools, techniques, and threats
🎯 Team Player: Collaborative approach with willingness to learn from experienced professionals


Let’s Discuss Your Security Needs

I’m eager to apply my technical skills in a professional environment and continue growing under the mentorship of experienced security professionals. Whether you need support for your SOC, assistance with vulnerability management, or help with security projects, I’m ready to contribute.

📧 Email: Completeness2025@protonmail.com
💼 LinkedIn: https://www.linkedin.com/in/onyebuchi-iyase-6975a6350/
🔗 GitHub: https://github.com/royalpriest07
🎯 TryHackMe: https://tryhackme.com/p/funbird009