I am an aspiring Cybersecurity professional specializing in Network Security, Incident Response (DFIR), and Threat Detection. I've built a secure virtual home lab and analyzed digital evidence to reconstruct cyber attacks.
I am currently looking for an IT help desk or a SOC role, with my eventual goal being a move into GRC auditing. I have a Cybersecurity BAS degree, a Philosophy BA, and CompTIA Security+, Network+, and A+ certifications. I am studying for the CySA+ exam in my spare time.
- Networking: Cisco IOS (Routing, Switching, ACLs), Inter-VLAN Routing, Subnetting, SPAN/Port Mirroring
- Security Operations: Wazuh (SIEM/XDR), Suricata (IDS), Network Traffic Analysis
- Digital Forensics: Autopsy, AccessData FTK Imager, Plaso, Windows Event Log Analysis
- Infrastructure: VMware Workstation Pro, GNS3, Linux (Ubuntu/Kali), Windows Server
Skills: Network Engineering, Threat Detection, Systems Integration
- Architected a segmented enterprise network using virtual Cisco routers and switches.
- Configured a SPAN port to mirror network traffic to a Suricata IDS.
- Centralized syslog and IDS alerts into a Wazuh SIEM, successfully detecting and alerting on simulated network attacks.
Skills: Disk Forensics, Timeline Reconstruction, IOC Extraction
- Conducted a forensic investigation on a legacy system compromised by ransomware using Autopsy.
- Extracted malware hashes and reconstructed a precise attack timeline to determine the execution vector and payload origin.
Skills: Incident Response, Artifact Analysis, Event Log Correlation
- Analyzed a disk image using FTK Imager to investigate a critical XDR alert on an isolated Windows Server.
- Correlated PowerShell logs, registry keys, and LNK files to trace a malicious USB payload that disabled Windows Defender and established a reverse shell.
- LinkedIn: linkedin.com/in/kyle-s-key/
- Email: kyle.s.key@gmail.com