Introducing Me

in introduceyourself •  3 years ago 

Hi! I'm Ikari. I'm a cybersecurity engineer with six years of hands-on experience.

My goal for this blog is to mirror my Medium content and things that may be off-topic or just not interesting.

I am 25, transitioning, and developing some cool stuff for the Plasma KDE wallpaper plugin system.

I've gained a great deal of knowledge regarding Vulnerability Management, Detection, and Response (VMDR) throughout my experience working in the cyber industry. Most notably, I am pretty proficient with the APIs provided by most VMDR systems with which I have the most hands-on expertise. I can produce personalized solutions tailored to the environment's specific needs in which I operate because of my extensive knowledge and distinct brand of creativity.

Incident response is another aspect of my professional background. In today's cybersecurity environment, the capacity to detect and react to possible attacks is critical. More significantly, mechanisms must be in place to analyze, classify, and prioritize such warnings and automate the process to remove noise and keep things running smoothly. I have previous experience with Splunk Phantom and am capable of creating playbooks. I am also currently researching Datadog's Cloud Monitoring solution.

The development of automated systems is critical to the success of a company's operations. The same holds for cybersecurity as well as for overall security. Automation provides speedier analysis and faster detection and response if a host on your network is hacked.

The ability to quickly and securely construct virtual environments for testing purposes is crucial when assessing new software for your regular deployment. A virtualization specialist like myself has worked with ESXi, proxmox, and other virtualization software. This has empowered me with the skills to stand up on Windows, Linux, and even Mac OS X virtual machines. In addition to serving as a sandbox, a virtual environment may be utilized to detonate malware and generate Indicators of Compromise for use by your Incident Response systems.

The average time to patch a vulnerability is over 60 days, and over 3/4 of cyber attacks in 2021 used vulnerabilities that were at least two years old. Many of these vulnerabilities can be patched and remediated through standardized patching, eliminating risk and, in some cases, even decreasing overall resource usage. I have helped develop these systems as well as reports for executives.

Cloud security is critical and is required for cybersecurity. I'm familiar with AWS and Azure, and I'm always eager to experiment with new technologies and systems.

Security is not just compliance for me and is involved in everything I do. I utilize the Secure SDLC style of development to ensure security is kept in mind throughout the life of the projects I work on.

If somehow, the above doesn't already tell you, I'm a nerd.

I develop games and learn new programming languages in my free time. I'm currently learning Ruby at the time of this writing.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  
Loading...