Technical Skills & Capabilities
Building a Strong Foundation Through Hands-On Learning
As an aspiring cybersecurity professional, I’ve invested hundreds of hours developing practical technical skills through self-directed learning, lab environments, and certification training. While I’m seeking my first professional role, I’ve built a solid technical foundation across key security domains.
Core Security Competencies
Network Security Fundamentals
Through TryHackMe labs and home lab practice, I’ve developed foundational skills in:
- Network Analysis: Packet capture and analysis using Wireshark and tcpdump to identify malicious traffic patterns
- Network Scanning: Proficient with Nmap for network reconnaissance and service enumeration
- Firewall Configuration: Hands-on experience with pfSense and basic iptables rule creation
- Network Protocols: Strong understanding of TCP/IP, DNS, HTTP/HTTPS, and common network services
- Network Segmentation: Implemented VLANs in home lab environment for security practice
- VPN Technologies: Configured OpenVPN and WireGuard for secure remote access
Practical Application: Built a home network lab to practice network security concepts and attack/defense scenarios
Vulnerability Assessment & Management
Skills developed through TryHackMe, Hack The Box, and personal projects:
- Vulnerability Scanning: Hands-on experience with Nmap, OpenVAS, and Nikto for identifying security weaknesses
- OWASP Top 10: Practical knowledge of common web vulnerabilities (SQL injection, XSS, CSRF, broken authentication)
- Vulnerability Analysis: Ability to assess CVE severity using CVSS scoring and prioritize remediation
- Exploit Research: Familiarity with searchsploit and Exploit-DB for vulnerability research
- Security Reporting: Experience documenting findings with risk ratings and remediation recommendations
Hands-On Practice: Completed 150+ TryHackMe rooms and 20+ Hack The Box machines focusing on vulnerability discovery
Operating Systems & Administration
Linux
- Command-line proficiency with bash scripting for security automation
- User and permission management, file system security
- Log analysis and system monitoring
- Experience with Kali Linux, Ubuntu, and Parrot Security OS
Windows
- Active Directory fundamentals and user management concepts
- PowerShell basics for security tasks
- Understanding of Windows security features (BitLocker, Windows Defender, UAC)
- Event log analysis for security monitoring
Penetration Testing & Offensive Security
Knowledge and skills developed through CTF challenges and practice environments:
Reconnaissance & Enumeration
- Information gathering using OSINT techniques
- DNS enumeration, subdomain discovery, and web reconnaissance
- Service enumeration and banner grabbing
Exploitation Techniques
- Basic exploitation using Metasploit Framework
- Manual exploitation of common vulnerabilities
- Understanding of privilege escalation techniques (Linux and Windows)
- Web application penetration testing methodologies
Tools Proficiency
- Burp Suite (Community Edition) for web application testing
- Metasploit for exploitation and post-exploitation
- John the Ripper and Hashcat for password cracking
- SQLmap for automated SQL injection testing
- Hydra for brute-force attacks
Active Learning: Currently ranked: Top 10% on TryHackMe with focus on offensive security paths
Cloud Security Fundamentals
Foundation in cloud security through AWS learning and certification preparation:
- AWS Basics: Understanding of EC2, S3, IAM, VPC, and CloudTrail
- IAM Best Practices: Implementing least privilege and multi-factor authentication
- Security Groups & NACLs: Configuring network access controls in cloud environments
- Cloud Monitoring: Familiarity with CloudWatch and basic log analysis
- Security Compliance: Understanding of cloud security frameworks and best practices
Certification: Preparing for AWS Cloud Practitioner certification
Security Tools & Technologies
SIEM & Log Analysis
- Theoretical knowledge of SIEM concepts from Security+ training
- Hands-on experience with Splunk (free tier) for log analysis
- Basic understanding of security event correlation and alerting
Security Monitoring
- Familiarity with Snort and Suricata for intrusion detection
- Experience with Security Onion in lab environment
- Understanding of security monitoring workflows
Endpoint Security
- Knowledge of EDR/AV concepts and deployment
- Familiarity with Windows Defender and endpoint hardening
Scripting & Automation
Python (Intermediate)
- Security tool automation and workflow scripting
- API interaction and data parsing
- Basic exploit development understanding
Bash/Shell (Intermediate)
- Automation of security tasks and system administration
- Log parsing and analysis scripts
- Integration of multiple security tools
PowerShell (Beginner)
- Basic Windows automation and security tasks
- Active Directory enumeration scripts
Projects: Created automated vulnerability scanning script integrating multiple tools (available on GitHub)
Compliance & Frameworks Knowledge
Through Security+ and self-study, I’ve developed understanding of:
- NIST Cybersecurity Framework: Core functions and practical implementation
- HIPAA: Healthcare data protection requirements
- PCI DSS: Payment card security standards basics
- GDPR: Data privacy regulation fundamentals
- Security Controls: NIST 800-53 and CIS Controls familiarity
Certifications
✓ CompTIA Security+ – Validated foundation in security concepts, threats, and best practices
✓ ISC² Certified in Cybersecurity (CC) – Entry-level security professional certification
🎯 In Progress: Master’s degree in Cybersecurity and Information Assurance
🎯 Planned: AWS Certified Cloud Practitioner, CompTIA CySA+
Additional Technical Skills
Documentation & Reporting
- Technical writing and vulnerability report creation
- Creating security documentation and standard operating procedures
- Presentation of technical findings to different audiences
Incident Response Basics
- Understanding of incident response lifecycle
- Basic malware analysis in isolated environments
- Digital forensics fundamentals
Cryptography
- Understanding of encryption algorithms and applications
- PKI concepts and certificate management
- Secure communication protocols
Hands-On Learning Platforms
TryHackMe
- Rank: current 187186/top 10%
- Rooms Completed: 38, covering offensive security, defensive security, and security fundamentals
- Focus Areas: Web exploitation, privilege escalation, network security, OWASP Top 10
Hack The Box
- Machines Pwned: 24, inactive for a while.
- Focus on realistic penetration testing scenarios
- Active participation in seasonal challenges
Additional Practice
- PentesterLab for web application security
- OverTheWire wargames for Linux fundamentals
- picoCTF and other beginner-friendly CTF platforms
Soft Skills That Complement Technical Abilities
Analytical Thinking
- Scientific training from biotechnology background enhances systematic problem-solving
- Methodical approach to security analysis and troubleshooting
Communication
- Ability to explain technical concepts to non-technical audiences
- Experience creating clear, concise documentation
- Comfortable presenting findings and recommendations
Self-Motivated Learning
- Demonstrated commitment through self-funded certifications and training
- Proactive skill development through labs and CTF participation
- Stay current with security news, vulnerabilities, and threat intelligence
Adaptability
- Quick learner comfortable with new tools and technologies
- Successfully transitioned from biotechnology to cybersecurity domain
- Embrace challenges and learning opportunities
Current Focus & Growth Areas
I’m actively expanding my skills in:
✓ Advanced Penetration Testing: Working through OSCP-style preparation materials
✓ Cloud Security: Deepening AWS security knowledge and pursuing additional cloud certifications
✓ Blue Team Skills: Building SOC analyst capabilities through SIEM and log analysis practice
✓ Threat Intelligence: Learning to identify, analyze, and respond to emerging threats
✓ Security Automation: Developing Python scripts for security workflow automation
How I Can Contribute to Your Team
Despite being entry-level, I offer:
🎯 Solid Foundation: Industry-recognized certifications validate my core security knowledge
🎯 Hands-On Experience: Hundreds of hours of practical lab work and CTF challenges
🎯 Learning Mindset: Proven ability to quickly acquire new skills and adapt to new technologies
🎯 Technical Writing: Strong documentation skills for reports, procedures, and findings
🎯 Fresh Perspective: Up-to-date knowledge of current tools, techniques, and threats
🎯 Team Player: Collaborative approach with willingness to learn from experienced professionals
Let’s Discuss Your Security Needs
I’m eager to apply my technical skills in a professional environment and continue growing under the mentorship of experienced security professionals. Whether you need support for your SOC, assistance with vulnerability management, or help with security projects, I’m ready to contribute.
📧 Email: Completeness2025@protonmail.com
💼 LinkedIn: https://www.linkedin.com/in/onyebuchi-iyase-6975a6350/
🔗 GitHub: https://github.com/royalpriest07
🎯 TryHackMe: https://tryhackme.com/p/funbird009
