Youshaa is an experienced Retail manager with more than 13 years of dedicated service in the retail industry. Now embarking on a transition into the field of Cybersecurity, this is due to his love of computers. Youshaa has an extensive background in retail which positions him as a unique asset with cross-over skills. Throughout his career, Youshaa has thrived in high-paced, high-stress managerial roles. His ability to maintain composure and make calculated decisions in challenging situations has consistently ensured the correct and timely course of action.
Youshaa has a well-established record of offering unwavering support and mentorship within the workplace. Notably, he has devised innovative tools aimed at risk mitigation and workflow enhancement, demonstrating his commitment to improving safety and efficiency. Drawing upon his honed skills from the retail sector, Youshaa excels in facilitating productive, clear, and concise conversations, often delving into complex subjects.
Youshaa’s approach is rooted in a compassionate, person-centred ethos that he carries into every professional endeavour. His experience, motivation, and adaptability make him a valuable addition to any team, ready to contribute effectively in the dynamic field of Cybersecurity.
Web application and hardening | Cybersecurity Bootcamp
The project was to create and secure a web application
Using Azure I deployed a docker container with the framework for the web page. Then I was able to bind a self-signed certificate to the site. Finally using the Web Application Gateway, Azure Front Door and Security Centre Recommendations I was able to secure and protect the site from malicious actors.
Penetration Testing | Cybersecurity Bootcamp
The project was to perform a penetration test on the fictitious Rekall Corporation
As a team we completed a capture the flag exercise across the companies 3 domains of its website, Linux servers and Windows Servers. Utilizing a number of tools including Foxy Proxy, Burpsuite, Metasploit, Google Dorking, Nmap, Nessus and other Vulnerability scanning and exploiting tools.
Building a Security Monitoring Environment | Cybersecurity Bootcamp
The project was to utilise a SEIM to monitor the fictitious Virtual Space Industries
Utilizing Splunk and additional Splunk Add-Ons I was able to monitor the company's logs to detect a brute force attack. The style of techniques and location of origin for the attack were all able to be determined via the dashboards I had created.
CompTIA SEC+
https://www.credly.com/badges/38062bad-b16b-43c5-89f4-05c4c9fb7f99/public_url