Skip to content

I built a rigorous cybersecurity project portfolio for simulated clients, covering NIST frameworks, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.

License

Notifications You must be signed in to change notification settings

Hugh-Kumbi/Cybersecurity-Portfolio

Repository files navigation

Hugh Chanetsa's Cybersecurity Portfolio

The modules 1-8 in this portfolio draw inspiration from Google's best practices.

For more information, please refer to the provided link.

Discover My Journey 🔍✨

Explore my GitHub portfolio to discover a range of cybersecurity and machine learning projects. I'm passionate about leveraging technology to solve real-world problems.

Professional Summary 🛠️📈

I am Hugh Chanetsa, a dedicated and results-driven cybersecurity professional with a multidisciplinary academic background and a strong commitment to safeguarding digital environments. I hold:

  • A Bachelor’s degree in Computer Science specializing in Software Engineering
  • A Bachelor of Commerce (Honors) degree specializing in Management Studies
  • A Bachelor’s degree in Social Sciences, focusing on International Relations and Affairs, Economic History, and Industrial Sociology

With expertise in Application Development Security, Networking, and System Administration, I am passionate about proactively identifying and neutralizing cyber threats to protect organizations and individuals from financial harm. Guided by a strong commitment to ethical standards and problem-solving, I strive to help organizations achieve their security goals by:

  • Safeguarding their networks
  • Developing secure applications to prevent intrusions
  • Mitigating risks effectively

My unique combination of technical skills, diverse academic experience, and a proactive approach to cybersecurity enables me to tackle complex challenges while driving innovation in this critical field.

Certifications 🎓

Education 📚

  • A Bachelor’s degree in Computer Science from the University of the People
  • A Bachelor of Commerce (Honors) degree from the University of Cape Town
  • A Bachelor’s degree in Social Sciences from the University of Cape Town

Cybersecurity Portfolio

Description: This comprehensive portfolio showcases a range of cybersecurity projects developed for simulated clients. The projects encompass various aspects of cybersecurity, including frameworks, audits, threat detection, and incident response.

Key Components:

  1. NIST Frameworks and Audits: Implementation of the National Institute of Standards and Technology (NIST) cybersecurity frameworks to establish robust security controls and conduct thorough audits.

  2. Linux and SQL Proficiency: Utilization of Linux environments and SQL databases to manage and analyze security-related data effectively.

  3. Asset, Threat, and Vulnerability Management: Identification and management of assets, assessment of potential threats, and evaluation of vulnerabilities to mitigate risks.

  4. Detection and Incident Response: Deployment of tools like Wireshark and tcpdump for network analysis, and implementation of Intrusion Detection Systems (IDS) such as Suricata. Development of incident response strategies, including escalation procedures.

  5. Security Information and Event Management (SIEM): Integration with SIEM platforms like Splunk and Chronicle to monitor and analyze security events in real-time.

  6. Python Automation: Development of Python scripts to automate repetitive tasks, enhancing efficiency in security operations.

Objective: The primary goal of this portfolio is to demonstrate a holistic understanding of cybersecurity principles and the practical application of various tools and methodologies to protect digital assets.

Cybersecurity Projects 👨🏽‍💻:

Projects Expertise Highlight
Security Controls and Compliance Evaluation INFOSEC, NIST Risk Management Framework, Security Audits, NIST Cybersecurity Framework, Incident Response Playbooks, CISSP, CIA triad
Network Security TCP/IP model, Network Architecture, Network Communication, Security Hardening, Network Security, Cloud Networks
Linux & SQL Command-line Interface, SQL, Linux, Bash
Assets, Threats, & Vulnerabilities Authentication, Vulnerability assessment, Cryptography, Asset Classification, Threat Modelling Analysis
Detection & Response Incident Lifecycle, Incident Journal
Tcpdump & Wireshark Packet Analyzer
IDS & SIEM Intrusion Detection System (IDS): Suricata, Security Information and Event Management (SIEM): Chronicle, Splunk
Automation with Python Computer Programming, Python Programming, Coding, PEP 8 Style Guide

Tools ⚙️

  • Google Workspace (Drive, Docs, Sheets, Slides)
  • Markdown Language
  • Tcpdump
  • Wireshark
  • Linux OS
  • SQL
  • Chronicle
  • Splunk
  • Suricata
  • Python

Supplementary Portfolio

Discover more of my work in these standalone portfolios:

  • Python - Cybersecurity - Automation Case
  • University - Course Work - Projects

Resume 🌐

Hugh Chanetsa's Resume

Eager to Contribute and Innovate 💡

I am eager to apply my cybersecurity knowledge and skills to challenging roles at leading organizations, where I can contribute to cutting-edge security initiatives.

Connect with Me 🤳

Feel free to connect with me on Twitter, LinkedIn, Instagram, and via chanetsa.hugh@protonmail.com. I’d love to network and share insights.

HughChanetsa | Twitter HughChanetsa | LinkedIn HughChanetsa | Instagram


License

This project is licensed under the MIT License - see the LICENSE file for details.

About

I built a rigorous cybersecurity project portfolio for simulated clients, covering NIST frameworks, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published