Tyler Patton
St. Louis, MO ***** Phone: 314-***-**** **************@*****.*** LinkedIn: https://bit.ly/3raligK
Summary
Analytical Cybersecurity Professional with a strong interest in security and architecture. Experience aligning security standards and operational goals. Professional approach to streamlining client services and pinpointing global system security solutions. Strives for peak performance, and is able to adjust work pace to meet evolving client needs and deadlines. Prepared to utilize leadership capabilities to solve complex problems.
Technical Skills
Programming Languages & Technologies: Bash scripting, cryptography, Cloud security, Hashcat, programming and scripting, Wireshark, Kali Linux, Metasploit, Burp Suite, Kibana, Splunk, Elasticsearch, Ansible, Docker, Python, Powershell, WebScarab, Autopsy, Microsoft Azure, MySQL, SQL, BeEF, CyberChef, Kerberos. JSON, Ubuntu, Snort
Cybersecurity & Networking: Digital Forensics and Methodology, Ethical Hacking and Penetration, Penetration Testing, Identity and Access Management, Networking, Packet Analysis, Security Operations and Analytics, Vulnerability Assessment, Windows and Linux Administration, Windows and Linux Hardening, Nmap/Zenmap, IPS, IDS, SIEM, APIs
Education
Security+ Certification Anticipated 10/2021
Cybersecurity Certificate - Washington University; St. Louis, MO 6/2021
Projects
Elk Stack https://github.com/Tpatt14/Elk-Stack-Project 2021
●Goal: To expose a load-balanced and monitored instance of DVWA.
●Responsibilities: Configured an Elk machine implemented by YAML Playbooks, to conduct scripting. Used Ansible to automate configuration of the ELK machine. Set up security groups and created VMs (virtual machines) within the resource group. Configured VM to install and run containers.
●Tools Used: Ubuntu, Ansible, Docker, Python, Load-Balancers, Metricbeat, Filebeat, DVWA, YAML Playbooks, and ELK (Elasticsearch, Logstash, and Kibana).
Capstone Project https://github.com/Tpatt14/Capstone_Engagment 2021
●Goal: Administered the assessment, analysis, and hardening of a Vulnerable System.
●Responsibilities: Conducted a security assessment, logged analysis and attack characterization. Tasked with hardening results, proposing alarms and mitigation strategies. Discovered exploitations on the target VM.
●Tools Used: Azure, metasploit, Kali Linux, Nmap, Hydra (to brute force attack), Crackstation, and Kibana
Red Team VS Blue Team https://github.com/Tpatt14/Red_Team_VS_Blue_Team 2021
●Goal: Played attacking, defending, and network analyzing roles.
●Responsibilities: Exploited vulnerabilities on the targeted machine, gaining access to user accounts and maintaining it. Implemented alerts for the attacks used and suggested ways to harden and patch the targeted machine. Analyze the attack, when, where, and how it took place.
●Tools Used: Played the role of a network analyst, using wireshark, and analysed all the incoming and outgoing data during the time of the attack. The ports, IP addresses, subnets, and malware species were all noted and investigated.
Experience
Installer 2016 - 2017
Battle Creek Tile & Mosaic; Battle Creek, MI
Met with clients and read blueprints to determine the appropriate flooring solutions. Advised clients about foreseeable costs before installation begins, helping them to make informed decisions. Led tear out and installation crews on commercial jobs like the Kellogg’s headquarters in Michigan, movie theaters, and schools.
Earned several industry relevant certifications including OSHA 10, anti-terrorism, etc.