Aspiring System Administrator | Security Operations Enthusiast
Iβm an IT student passionate about enterprise infrastructure and security hardening. I focus on building resilient systems, automating administrative tasks, and understanding the βwhyβ behind network vulnerabilities. Iβm exploring cybersecurity roles where I can leverage infrastructure expertise like IAM, SOC analysis, and cloud security.
- Active Directory: Building forest/domain structures, GPO hardening, and identity management.
- Security Research: Traffic analysis with Wireshark and threat modeling in virtualized environments.
- Automation: Leveraging PowerShell and Bash to streamline repetitive SysAdmin tasks.
Deployment of a Windows Server 2025 environment featuring automated user onboarding and GPO-based hardening.
- Tools: VMware, Windows Server, PowerShell, Group Policy.
- Key Achievements: Successfully promoted a DC in a new forest (
homelab.local) and designed a logical OU hierarchy (UAE_Assets) to streamline administrative delegation, and implementing restricted groups via GPO.
A collection of packet captures and analysis reports focusing on identifying suspicious network behavior.
- Tools: Wireshark, TShark, Nmap.
- Key Outcome: Identified anomalous DNS and HTTP traffic patterns to simulate real-world threat detection.
| Category | Tools & Technologies |
|---|---|
| Security & Net | Wireshark, Nmap, Metasploit, John the Ripper, CyberChef, Crackstation, TCP/IP |
| Infrastructure | Windows Server 2025, Active Directory (AD DS), Microsoft Entra ID |
| Virtualization | VMware Workstation, Hyper-V, Oracle VirtualBox |
| OS & Scripting | Linux (Ubuntu/Debian), Windows 10/11, PowerShell, Bash, Python |
| Support Tech | ServiceNow/Ticketing, Remote Desktop (RDP), Hardware Troubleshooting |