Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings
View kyle-s-key's full-sized avatar

Block or report kyle-s-key

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kyle-s-key/README.md

Hi there, I'm Kyle Key 👋

I am an aspiring Cybersecurity professional specializing in Network Security, Incident Response (DFIR), and Threat Detection. I've built a secure virtual home lab and analyzed digital evidence to reconstruct cyber attacks.

I am currently looking for an IT help desk or a SOC role, with my eventual goal being a move into GRC auditing. I have a Cybersecurity BAS degree, a Philosophy BA, and CompTIA Security+, Network+, and A+ certifications. I am studying for the CySA+ exam in my spare time.


🛠️ Technical Arsenal

  • Networking: Cisco IOS (Routing, Switching, ACLs), Inter-VLAN Routing, Subnetting, SPAN/Port Mirroring
  • Security Operations: Wazuh (SIEM/XDR), Suricata (IDS), Network Traffic Analysis
  • Digital Forensics: Autopsy, AccessData FTK Imager, Plaso, Windows Event Log Analysis
  • Infrastructure: VMware Workstation Pro, GNS3, Linux (Ubuntu/Kali), Windows Server

🏆 Featured Portfolio Projects

Skills: Network Engineering, Threat Detection, Systems Integration

  • Architected a segmented enterprise network using virtual Cisco routers and switches.
  • Configured a SPAN port to mirror network traffic to a Suricata IDS.
  • Centralized syslog and IDS alerts into a Wazuh SIEM, successfully detecting and alerting on simulated network attacks.

Skills: Disk Forensics, Timeline Reconstruction, IOC Extraction

  • Conducted a forensic investigation on a legacy system compromised by ransomware using Autopsy.
  • Extracted malware hashes and reconstructed a precise attack timeline to determine the execution vector and payload origin.

Skills: Incident Response, Artifact Analysis, Event Log Correlation

  • Analyzed a disk image using FTK Imager to investigate a critical XDR alert on an isolated Windows Server.
  • Correlated PowerShell logs, registry keys, and LNK files to trace a malicious USB payload that disabled Windows Defender and established a reverse shell.

📫 Let's Connect

Popular repositories Loading

  1. kyle-s-key kyle-s-key Public

    I'm an aspiring cybersecurity professional, currently looking to get into an IT help desk or a SOC role, with an aim toward eventually moving into GRC. I have a Cybersecurity BAS degree, a Philosop…

  2. HomeLab HomeLab Public

    An SOC home lab environment with Wazuh, Suricata and GNS3.

  3. DFIR-Ransomware-Investigation DFIR-Ransomware-Investigation Public

    Timelining a ransomware infection with Autopsy.

  4. DFIR-Reverse-Shell-Analysis DFIR-Reverse-Shell-Analysis Public

    Timelining a reverse shell compromise with FTK Imager.

Morty Proxy This is a proxified and sanitized view of the page, visit original site.