Kwangsa19 / Ketmanto-Cybersecurity-Portfolio

I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Ketmanto-Cybersecurity-Portfolio

Modul 1-8 are inspired by Google. Please visit this link for further information. More are to come, stay tuned!

Professional Statements

I am Ketmanto Wangsa. I am a Warehouse Assistant with four years of experience in the transport industry and nearly two years in the retail sector. During remote internship at a leading US supplier, I had the opportunity to serve as both Technical Support and Team Leader of the Sourcing Team. Furthermore, I completed the IBM Engagement Specialist program to enhance my interpersonal skills.

Recently, I completed the Google IT Support and Cybersecurity Professional Certificate to pursue my passion for technology and Cybersecurity. The Google IT Support and Cybersecurity Professional Certificate have prepared me for industry-ready jobs. My ultimate goal is to become a Security Analyst. This role suits me because I have strong analytical abilities, persistence, eagerness to learn, a can-do attitude, problem-solving skills, and communication skills to address problems and emerging threats. As of February 2024, I am preparing to take the Linux Foundation Certified Associate (LFCA), CompTIA A+ and CompTIA Security+ certifications.

Portfolio

Please visit this link for further information.

Some of my documents are in PDF format to accommodate advanced formatting, include colorful presentations, and incorporate abundant screenshots for enhanced clarity and detail.

I have developed a cybersecurity portfolio showcasing various tasks and projects completed during my journey to earn the Google Cybersecurity Professional Certificate. This program has provided insights into:

  • Programming for cybersecurity tasks
  • Frameworks and controls that inform security operations
  • SIEM tools for cybersecurity
  • Detecting and responding to incidents using an intrusion detection system
  • Performing packet capture and analysis

Additionally, it has paved the way for me to pursue one of the entry-level following roles:

  • Cybersecurity Analyst
  • Security Analyst
  • SOC Analyst
  • Information Security Analyst
  • IT Security Analyst
  • Cyber Defense Analyst

Skills

Projects Skills/Knowledge Gained
1 - Conduct a security audit INFOSEC, NIST Risk Management Framework, Security Audits, NIST Cybersecurity Framework, Incident Response Playbooks, CISSP, CIA triad
2 - Network Security TCP/IP model, Network Architecture, Network Communication, Security Hardening, Network Security, Cloud Networks
3 - Linux & SQL Command-line Interface, SQL, Linux, Bash
4 - Assets, Threats, & Vulnerabilities Authentication, Vulnerability assessment, Cryptography, Asset Classification, Threat Modelling Analysis
5 - Detection & Response Incident Lifecycle, Incident Journal
6 - Tcpdump & Wireshark Packet Analyzer
7 - IDS & SIEM Intrusion Detection System (IDS): Suricata, Security Information and Event Management (SIEM): Chronicle, Splunk
8 - Automation with Python Computer Programming, Python Programming, Coding, PEP 8 Style Guide

Tools

Several tools that I used:

  • Google Workspace (Drive, Docs, Sheets, Slides)
  • Markdown Language
  • Tcpdump
  • Wireshark
  • Linux OS
  • SQL
  • Chronicle
  • Splunk
  • Suricata
  • Python

Other references

Please have a look on other standalone portfolio that I published:

Stay tuned for updates!

This portfolio will continuously grow as I complete more certificates and projects. I encourage you to visit again to see my progress and learn more about my skills and experience. Thank you for your time. For more information, please connect with me on Linkedin.

About

I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.


Languages

Language:Jupyter Notebook 100.0%