Andy Nguyen
Toronto, ON 647-***-**** ****.****.*******@*****.*** LinkedIn
Passionate Cyber Security Student seeking opportunities to learn and expand knowledge in the field. Quick learner adept at working with new technologies in the ever-evolving cyber security landscape. TECHNOLOGY PROFILE
Operating Systems: Linux (Debian, Arch, Fedora), Windows (11/10/8/7/Vista/XP), Windows Server
(2019/2016/2012/2008)
Programming Languages: C, Python, JavaScript
Software/Tools: VMware, VirtualBox, Docker, Nmap, Nessus, Greenbone, Metasploit, Autopsy, John The Ripper, FTK Image, Volatility, Burp Suite, Splunk, Networkminer, Regshot, PEID, Process Hacker, Process Monitor, Splunk, Security Onion, Pcap Monkey, Active Directory
WORK EXPERIENCE
Computer Technician, Laptop For Less Mississauga, ON October 2018 – August 2019
● Successfully used oral communication skills to patiently explain the installation of drivers to customers
● Fulfilled multiple customer orders, installed and configured Windows Server & Linux operating systems and software applications all while performing other routine tasks
● Troubleshooted hardware and software issues making the correct diagnosis, performing necessary repairs Welding, Venture Metal Works Incorporated Toronto, ON Summer 2020-2022
● Experienced in troubleshooting welding problems and finding solutions to technical challenges.
● Skilled in interpreting technical drawing/blueprints and capable of fabricating parts to exact specifications based on the drawing/blueprint.
● Attention to detail demonstrated through the proficiently performance of MIG & TIG welding EDUCATION - COURSE EXPERIENCE
Bachelor of Technology – Informatics and Security September 2020-Present Seneca College of Applied Arts and Technology
Cisco Networking
● Skilled in configuring, maintaining, and troubleshooting Cisco infrastructure including routers and firewalls.
● Implemented and troubleshooted network configuration
● Designed and implemented enterprise networks for multiple customers using Cisco technologies Digital Forensics
● Utilized forensic tools and techniques to extract and analyze digital evidence.
● Preserved and analyzed evidence from a variety of devices.
● Digital forensics tools used: EnCase, FTK, Volatility, Autopsy
● Able to recover
Operation System Knowledge
● Proficient in Linux command line, able to navigate through file directory and experience in automating tasks.
● Proficient in creating and managing virtual machines using virtualization technologies such as VMware, VirtualBox, or Hyper-V.
● Proficient in Windows Server Active Directory, capable of configuring group policies and creating user accounts. Threat Hunting
● Demonstrated proficiency in utilizing Security Onion for proactive threat hunting and identifying Malware
● Successful threat hunting requires a range of technical and analytical skills, as well as access to a variety of security tools and technologies.
● Proficient in malware analysis, utilizing advanced techniques to dissect malicious code and identify its functionalities, vulnerabilities, and potential impact.
REFERENCES
Available upon request