About
I am a highly motivated and detail-oriented Cybersecurity Analyst with a strong passion for protecting systems and networks. Proven ability to quickly acquire relevant knowledge and skills, with a strong desire to continuously learn and explore more. Robust knowledge about industry standards like PCI-DSS, ISO 27001, HIPAA, NIST frameworks.
Work
Tata Consultancy Services
|Cybersecurity Security Analyst Job Simulation on Forage
Highlights
Completed a job simulation involving identity and access management (IAM) for Tata Consultancy Services, collaborating with a Cybersecurity Consulting team.
Acquired expertise in IAM principles, cybersecurity best practices, and strategic alignment with business objectives.
Delivered comprehensive documentation and presentations, showcasing the ability to communicate complex technical concepts effectively.
Elohim Oil and Gas
|Account Officer
Full Time
Summary
1. Ledger Balancing. 2. Record sales and credit in microsoft excel. Supermarket Inventory Managament
Certificates
Cybersecurity Analyst Job Simulation
Issued By
Forage
Skills
Wireshark
scanning, capturing, filtering, analyzing network traffic.
Nmap
scanning networks, discover open ports, vulnerabilities, identifying operating system versions.
Amazon Web Services (AWS)
creating AWS instances, configuring security groups, accessing instances via SSH with PuTTY.
Gophish
conducting phishing campaigns, assess employee adherence to company policies, create phishing awareness.
Operating Systems
installing and using various operating systems, Kali Linux, Ubuntu, Parrot OS, Windows.
Insider Risk Management
Data Loss Prevention.
Microsoft sentinel
Microsoft defender for endpoint
Incident response
Interests
About Me
cybersecurity enthusiast, driven by a personal passion to protect systems and networks, stemming from previous experiences, committed to continuous learning and exploration, ensuring I stay up-to-date with the latest technologies and threats.
Projects

AWS Identity And Access Management
Summary
In this project i created an AWS Linux instance, created a security group where i set the inbound rule to allow only SSH traffic from my IP. I also configured identity and access management where i set policies to allow or deny specific group of users access to the Ec2 instance. I also set up multi-factor authentication for increased security.


