Skip to content
View cy-sc2911's full-sized avatar
🎯
Lock in
🎯
Lock in

Block or report cy-sc2911

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
cy-sc2911/README.md

Cybersecurity Professional | Blue Team | Red Team
Breaking things ethically Β· Defending better

🎯 About Me

Cybersecurity professional with 10 years of operational experience in data governance and security operations. I combine hands-on technical skills with industry-recognized certifications, specializing in both offensive and defensive security disciplines.

πŸ›  Technical Stack

Languages & Scripting

Python β€’ Bash β€’ SQL

Operating Systems

Kali Linux β€’ Debian β€’ Ubuntu β€’ Windows 10/11

Tools & Frameworks

Category Tools
Network Security Wireshark β€’ Nmap β€’ Cisco Packet Tracer
Cloud & Identity Microsoft 365 β€’ Entra ID β€’ Exchange β€’ SharePoint β€’ Intune
Security Labs TryHackMe β€’ Cisco Packet Tracer
Development GitHub β€’ Git

πŸ† Certifications

  • Google Cybersecurity Professional Certificate β€” Coursera

    • Risk Management, Security Audits, IAM, Incident Response, DLP, Python/Linux/MySQL
  • Cisco Networking Academy

    • Introduction to Cybersecurity
    • Networking Basics (IP Addressing, Subnetting, Routing, DHCP, DNS)

πŸ’» Featured Projects

πŸ›‘οΈ Blue Team (Defensive Security)

Project Description Tools
Microsoft 365 Monitoring SOC operations: monitoring Entra ID, Exchange, SharePoint, and Intune security events Entra ID, SPLUNK, TryHackMe
Network Security Lab Cisco Packet Tracer labs: SOHO setup, hierarchical design, Ethernet switching, DNS/DHCP configuration Cisco Packet Tracer, Networking

βš”οΈ Red Team (Offensive Security)

Project Description Tools
Custom Brute-Force Tooling Python-based password attack tools from TryHackMe labs Python
Payload Development Custom exploit creation and testing Python
Social Engineering Toolkit (SET) Phishing fundamentals: techniques, psychology, campaign anatomy, SET framework Red Team, Penetration Testing
Vulnerability Scanning Intermediate-level vulnerability assessment across systems, networks, and web applications Nmap, Nikto

🌐 Infrastructure & Networking

Project Description Tools
CISCO Networking Devices Network design, Ethernet switching, IPv4, ARP, DNS, DHCP, transport layer, IOS CLI Cisco, Networking
Cisco Networking Basics Hands-on labs: IP addressing, subnetting, routing, switching, wireless configuration Packet Tracer

πŸ“š Learning Path

  • βœ… Fundamentals: Networking protocols, TCP/IP stack, system security
  • βœ… Certifications: Google Cybersecurity + Cisco Networking
  • πŸ”„ Hands-On Labs: TryHackMe rooms, Cisco Packet Tracer labs, custom tools
  • 🎯 Current Focus: Advanced vulnerability assessment, SOC operations, incident response

πŸ’‘ Core Competencies

Skill Proficiency
Data Governance & PII/SPII Management Expert
Network Design & Troubleshooting Intermediate
Penetration Testing & Vulnerability Scanning Intermediate
Python Automation & Scripting Intermediate
Microsoft 365 & Cloud Security Intermediate
Blue Team / Defensive Operations Intermediate
Red Team / Offensive Techniques Intermediate

πŸš€ Philosophy

'I have no special talent. I am only passionately curious.' β€” Albert Einstein

I believe in:

  • Ethical hacking: Understanding attacks to defend better
  • Continuous learning: The security landscape evolves constantly
  • Practical skills: Labs and real-world scenarios over theory alone
  • Accountability: Security is everyone's responsibility

Last Updated: April 2026

Pinned Loading

  1. CISCO_Networking_Devices CISCO_Networking_Devices Public

    Notes and labs from the Cisco Networking Devices course (NetAcad) | Covering network design, Ethernet switching, IPv4 addressing, ARP, DNS, DHCP, transport layer protocols, and Cisco IOS CLI

  2. Microsoft_365 Microsoft_365 Public

    Documentation and hands-on notes for monitoring Microsoft 365 (Entra ID, Exchange, SharePoint & Intune) from a SOC perspective, based on the TryHackMe M365 Monitoring module.

  3. phishingbasics phishingbasics Public

    Notes and documentation on phishing fundamentals. Covering phishing techniques, the psychology of social engineering, anatomy of a phishing campaign, and the Social Engineering Toolkit (SET).

  4. vulnerability-scanning-tools vulnerability-scanning-tools Public

    Documentation of intermediate-level vulnerability scanning concepts β€” identifying weaknesses, misconfigurations, and security issues across systems, networks, and web applications.

  5. Google_Cybersecurity_Certificate_Lesson_07 Google_Cybersecurity_Certificate_Lesson_07 Public

    Hands-on Python scripting from the Google Cybersecurity Certificate (Lesson 07) | Automating file parsing, managing allow lists, and analyzing login data for security operations.

    Python

  6. bruteforce_TryHackMe_lab bruteforce_TryHackMe_lab Public

    SSH brute force attack tool built for TryHackMe lab | Python | Educational purposes

    Python