The modules 1-8 in this portfolio draw inspiration from Google's best practices.
For more information, please refer to the provided link.
Explore my GitHub portfolio to discover a range of cybersecurity and machine learning projects. I'm passionate about leveraging technology to solve real-world problems.
I am Hugh Chanetsa, a dedicated and results-driven cybersecurity professional with a multidisciplinary academic background and a strong commitment to safeguarding digital environments. I hold:
- A Bachelor’s degree in Computer Science specializing in Software Engineering
- A Bachelor of Commerce (Honors) degree specializing in Management Studies
- A Bachelor’s degree in Social Sciences, focusing on International Relations and Affairs, Economic History, and Industrial Sociology
With expertise in Application Development Security, Networking, and System Administration, I am passionate about proactively identifying and neutralizing cyber threats to protect organizations and individuals from financial harm. Guided by a strong commitment to ethical standards and problem-solving, I strive to help organizations achieve their security goals by:
- Safeguarding their networks
- Developing secure applications to prevent intrusions
- Mitigating risks effectively
My unique combination of technical skills, diverse academic experience, and a proactive approach to cybersecurity enables me to tackle complex challenges while driving innovation in this critical field.
- University of the People Certification in Data Science
- University of the People Certification in Network and Application Security
- Google Cybersecurity Professional Certification
- A Bachelor’s degree in Computer Science from the University of the People
- A Bachelor of Commerce (Honors) degree from the University of Cape Town
- A Bachelor’s degree in Social Sciences from the University of Cape Town
Description: This comprehensive portfolio showcases a range of cybersecurity projects developed for simulated clients. The projects encompass various aspects of cybersecurity, including frameworks, audits, threat detection, and incident response.
Key Components:
-
NIST Frameworks and Audits: Implementation of the National Institute of Standards and Technology (NIST) cybersecurity frameworks to establish robust security controls and conduct thorough audits.
-
Linux and SQL Proficiency: Utilization of Linux environments and SQL databases to manage and analyze security-related data effectively.
-
Asset, Threat, and Vulnerability Management: Identification and management of assets, assessment of potential threats, and evaluation of vulnerabilities to mitigate risks.
-
Detection and Incident Response: Deployment of tools like Wireshark and tcpdump for network analysis, and implementation of Intrusion Detection Systems (IDS) such as Suricata. Development of incident response strategies, including escalation procedures.
-
Security Information and Event Management (SIEM): Integration with SIEM platforms like Splunk and Chronicle to monitor and analyze security events in real-time.
-
Python Automation: Development of Python scripts to automate repetitive tasks, enhancing efficiency in security operations.
Objective: The primary goal of this portfolio is to demonstrate a holistic understanding of cybersecurity principles and the practical application of various tools and methodologies to protect digital assets.
Projects | Expertise Highlight |
---|---|
Security Controls and Compliance Evaluation | INFOSEC , NIST Risk Management Framework , Security Audits , NIST Cybersecurity Framework , Incident Response Playbooks , CISSP , CIA triad |
Network Security | TCP/IP model, Network Architecture , Network Communication , Security Hardening , Network Security , Cloud Networks |
Linux & SQL | Command-line Interface , SQL , Linux, Bash |
Assets, Threats, & Vulnerabilities | Authentication , Vulnerability assessment , Cryptography , Asset Classification , Threat Modelling Analysis |
Detection & Response | Incident Lifecycle , Incident Journal |
Tcpdump & Wireshark | Packet Analyzer |
IDS & SIEM | Intrusion Detection System (IDS): Suricata , Security Information and Event Management (SIEM): Chronicle , Splunk |
Automation with Python | Computer Programming , Python Programming , Coding , PEP 8 Style Guide |
- Google Workspace (Drive, Docs, Sheets, Slides)
- Markdown Language
- Tcpdump
- Wireshark
- Linux OS
- SQL
- Chronicle
- Splunk
- Suricata
- Python
Discover more of my work in these standalone portfolios:
- Python - Cybersecurity - Automation Case
- University - Course Work - Projects
I am eager to apply my cybersecurity knowledge and skills to challenging roles at leading organizations, where I can contribute to cutting-edge security initiatives.
Feel free to connect with me on Twitter, LinkedIn, Instagram, and via chanetsa.hugh@protonmail.com. I’d love to network and share insights.
This project is licensed under the MIT License - see the LICENSE file for details.