Cybersecurity enthusiast

with excellent problem resolution and critical thinking skills. Experienced in effectively building and managing client relationships and dealing with complex solutions. Skilled at absorbing and applying new technologies and concepts in a corporate environment.

Education

Associates in Computer Science
New Jersey Institute of Technology
New Jersey, United States
May 2020


Projects






Linux Security
Mar 2021 โ€“ Apr 2021
Installed Debian Linux and hardened security for service using Apache
Configured network security using whitelist SSL security and IP lockout.
ย The Debian developers provide security updates for all packages over their lifetime whenever


Network Security
Jan 2021 โ€“ Feb 2021
Scope: Act as a security analyst to protect company communication.
Set up 3 machines: client, host, and threat; establish a connection and communicate through network requests and emails. Imitate a threat to extract info and intercept traffic-utilizing Wireshark. Established protocols, secure channels in the sandbox environment, translated and encrypted code using Kali.org. Configured firewall using PFSense.b 2021



Secure the Network
Feb 2021
Implement some security policies to solve some genuine problems companies face in todayโ€™s world.
Knowledge of firewalls, IDS, and network attacks.
Knowledge of computer networking concepts and Linux and Windows skills.

Build a Windows Virtual Machine
Nov 2020 โ€“ Dec 2020
Utilized virtualization software to create a virtual machine.
Loaded operating system (Windows Server 2012) and performed basic setup; encrypt username and password. Ran a test and set up the network. Looked up the IP address and ping virtual machine to ensure the connection was established.


Installation of WAN
Nov 2020 โ€“ Dec 2020
Built Wide Area Network (WAN) for a bank branch, including three LANs.
Identified ISP, designed layout for bandwidth, line quality, and hardware.
Built WAN utilizing VPN for configurations.
Utilized Cisco Packet Tracer 7.2.2.


Network Configuration
Oct 2020 โ€“ Nov 2020
Set up corporate network and implement security settings for a new bank branch. Devised network Topology plan and where to assign an IP address. Built VLANs, trunks, and routers to allow multiple stream communication. Arranged switches to communicate with port security and routers to work with OSPF.
Configured network devices to prevent unauthorized access by securing privilege mode, encrypting passwords, and designed security messaging. Conducted a successful connectivity test.

Ethical Hacking
Apr 2021 โ€“ May 2021
Used Kali Linux and Metasploitable to crack archive passwords, discover credential hashes, extract credentials, discover open ports, and exploit system vulnerabilities.
Leveraged knowledge of MITM attacks, network scanning, brute-force, social engineering, Windows and Linux privilege escalation, web application security, and vulnerability scanning to develop threats.

Python Scripting
May 2021-Jun 2021
Developed Python script and implemented ARP spoof detector to exploit vulnerabilities and determine if the machine is under attack.
Python is a general-purpose programming language, so it can be used for many things. Python is used for web development, AI, machine learning, operating systems, mobile application development, and video games.


Capture the flag challenge
Mar 2021 โ€“ Apr 2021
An organizationโ€™s monitoring system identified suspicious download activities captured in a honeypot that was named Cowrie. The event was recorded by the Splunk system, but it cannot be accessed because its operator, the head of the security investigation team, was recently released from the company. You were hired as a security analyst not long after. Using the knowledge acquired in class, connect to the Splunk system, investigate the events, and identify a suspicious message to obtain the FLAG.

Certifications


Cloud Security See Credentials
Issued Jan 2020
Graduates of Cloud Security Course understand different CSPs, the services that are provided with hands-on experience dealing with virtualization, cloud security through the proper practices of least privilege model with the use of GPOs, and basics of an SDN.

Network Security See Credentials
Issued Feb 2021
Graduates of the Network Security Course show a basic understanding of protecting endpoint mechanisms through a layered approach with traffic analysis. The use of authentication systems and port security to help prevent certain exploits in a network in both layer two and three with the help of firewalls, IPS, and IDS.


Ethical Hacking See Credentials
Issued Feb 2021
Graduates of the Offensive Security: Ethical Hacking Course show the ability to ethically perform and document the process of the cyber kill chain model for the reasons of hardening a companyโ€™s network/website to prevent themselves from being exploited by actual threat actors.

Microsoft SecuritySee Credentials
Issued Nov 2020
Graduates of the Microsoft Security Course show the ability to work with Active Directory Domain Services in a small internal network have put in place the proper security practices of least privilege model as well as endpoint security to reduce insider threats and privilege escalation.

Linux SecuritySee Credentials
Issued Jan 2020
Graduates of the Linux Security Course understand terminal fundamentals in Unix operating systems with usersโ€™ permissions, system, and networking management. Additionally, the security practices of Hardening the Linux OS and the network.


Python for SecuritySee Credentials
Issued Feb 2021
Graduates of the Introduction to Python for Security Course show the ability to complete basic programming challenges in the Python language with an understanding of secure coding practices for both defensive and offensive purposes.

Game theory Strategy – See Credentials
Issued Feb 2021
Graduates from the Game Theory Course show an understanding of abstracted threat modeling applicable for securing organizations by using strategic and tactical applied analysis and decision theory. By using the techniques learned in this course, the graduates will be better prepared to understand the risks and threats which will assist them in improving any organizations security posture.

DFIR & Threat huntingSee Credentials
Issued Feb 2021
Graduates from the DFIR & Threat Hunting Course show the ability to do a live and dead analysis of both Windows and Linux systems with proper documentation, understand each stage of the Incident response plan with the importance of threat hunting to prevent future occurrences per business continuity and management to remain compliant with standards and regulations.


Cyber InfrastructureSee Credentials
Issued Feb 2021
Graduates of the Cyber Infrastructure Technology Course show the ability to protect and secure a network architecture through different layers of security such as physical, endpoint, and infrastructure. The use of SIEM & SOAR operations to help increase the productivity of a blue team through aggregation and correlation alerts in a working environment.

Computer Networking – See Credentials

Issued Dec 2020
Graduates of the Network Course show the ability of networking fundamentals with an understanding and importance of separating networks, creating ACLs, and setting up port security. The separation of networks through VLANSs or subnetting to minimize network intrusions from internal or external threat actors.

Jaineel Thakkar

New Jersey, United States
jaineelthakkar@outlook.com
+1 (908)-926-4528