top of page

Google Projects
Structured Query Language (SQL)
By using SQL filtering I checked company logs to investigate a potential security risk involving login attempts. I also located all devices needing software updates. Both of these tasks increase the cybersecurity of my organization and therefore the security of their data.
Log Analysis (Wireshark)
Use Wireshark for log analysis to discover a DoS attack.
Intrusion Detection System (IDS)
Practical experience in running Suricata to
-
create custom rules and run them in Suricata,
-
monitor traffic captured in a packet capture file, and
-
examine the fast.log and eve.json output.
Network Analysis (tcpdump)
Use tcpdump for network traffic analysis to investigate a website that is not loading.
bottom of page