- Cybersecurity ProfessionalMay 21, 2020Jonathan Brand

Cybersecurity Professional
May 21, 2020
Jonathan Brand
Jonathan Brand
-Work with Active Directory Domain Services in a small internal network and put in place the proper security practices of least privilege model as well as endpoint security to reduce insider threats and privilege escalation.
-Separate networks through VLANSs or subnetting to minimize network intrusions from internal or external threat actors. Create ACLs and set up port security.
-Understand different CSPs, cloud security through the proper practices of least privilege model with the use of GPOs, and the basics of an SDN.
-Understand terminal fundamentals in Unix operating systems with users’ permissions and networking management. Additionally, the security practices of Hardening the Linux OS and the network.
-Protect endpoint mechanisms through a layered approach with traffic analysis. Use authentication systems and port security to help prevent exploits in a network in layers two and three with the help of firewalls, IPS, and IDS.
-Protect and secure a network architecture through different layers of security such as physical, endpoint, and infrastructure. The use of SIEM & SOAR operations to help increase the productivity of a blue team through aggregation and correlation alerts in a working environment.
-Understand the basic programming challenges in the Python language for defensive and offensive purposes.
-Perform and document the process of the cyber kill chain model to prevent themselves from being exploited by actual threat actors.
-Perform a live and dead analysis of Windows and Linux systems with proper documentation, understand each stage of the Incident response plan with the importance of threat hunting to prevent future occurrences per business continuity and management to remain compliant with standards and regulations.
-Apply the abstracted threat modeling for securing organizations.
Skills / Knowledge
- Microsoft Security
- Linux Security
- network Security
- Cyber Infrastructure & Technology
- Introduction to Python for Security
- Offensive Security: Ethical Hacking
- DFIR & Threat Hunting
- Game Theory Strategy in Cybersecurity
Issued on
May 21, 2020
Expires on
Does not expire