Who I Am
THE FULL PICTURE.
I'm a cybersecurity student who got into this field because I couldn't stop asking "how does that actually work?" — and once I started finding the answers, I couldn't stop. I've always been pulled toward understanding systems at a deep level, which makes security a natural fit.
"I don't just study for exams — I build labs, break things intentionally, and learn from what happens."
I recently earned the CompTIA trifecta: A+, Network+, and Security+. That's not the finish line — it's the foundation. I'm already working toward my next certs while simultaneously building hands-on projects that prove what I know, not just what I can memorise.
I'm looking for an environment where I can contribute real work, keep learning at pace, and work alongside people who take security seriously. If that's you — let's talk.
My Journey
HOW I GOT HERE.
The Beginning
Fell Down the Rabbit Hole
Started digging into how networks actually work — subnetting, protocols, packet flows. What started as curiosity became an obsession.
Cert #1
CompTIA A+ Earned
Hardware, OS fundamentals, troubleshooting. Built the IT foundation that everything else sits on top of.
Cert #2
CompTIA Network+ Earned
Deep dived into networking — TCP/IP stack, routing, switching, VLANs, network security architecture. This one changed how I see everything.
Cert #3
CompTIA Security+ Earned
Threats, attacks, risk management, cryptography, identity. The DoD-approved cert that opened the door to security-specific roles.
Now
Current Focus
Running home labs, building portfolio projects, studying toward the next certification. The grind continues.
Technical Skills
WHAT I BRING.
Network Security
Proficient
TCP/IP & Protocols
Strong
Wireshark / Packet Analysis
Comfortable
Threat Analysis
Proficient
Incident Response
Learning
Cryptography Concepts
Cert-Level Knowledge
Virtualisation / Labs
Regular Practice
Interests
WHAT DRIVES ME.
🔴
Offensive Security
Thinking like an attacker to understand how defences can fail
🛡️
Blue Team
Detection, response, and hardening systems against real threats
🔬
Malware Analysis
Understanding malware to learn how it ticks and how to defend against it
🌐
Network Forensics
Reading traffic to find what shouldn't be there
⚙️
Home Labs
Building environments to test, break, and learn from
📚
Continuous Learning
Certs, CTFs, writeups — always something new to study
What's Next
THE ROADMAP.
>_
SAL1 — Next certification target to move into more hands-on offensive security territory
Up Next
>_
Home Lab Expansion — Building projects to get hands-on experience with what I'm learning
In Progress
>_
TBD — Building out a dedicated lab environment with attack and defend simulations
Coming Soon
>_
First Security Role — Internship, junior analyst, or SOC position to start building professional experience
Goal