Charles Lewis
***@*******.*** https://www.chl*.link Battle Creek, MI
---
Summary
Motivated and technically skilled IT professional with hands-on experience in systems administration, cybersecurity, and penetration testing. Proficient in securing infrastructure, managing IT operations, and simulating real-world attack scenarios using tools such as Nessus, Kali Linux, and Metasploit. Currently advancing expertise through TryHackMe and a self-hosted cybersecurity lab environment.
Technical Skills
- Penetration Testing & Vulnerability Assessment: Kali Linux, Metasploit, Burp Suite, Nessus, Hyperion
- Operating Systems: Windows, Linux (Kali, Ubuntu)
- System Administration: Active Directory, Group Policy, DNS, DHCP
- Scripting & Automation: PowerShell, Bash, Python (basic)
- Virtualization & Labs: VMware Workstation, Metasploitable2
- Networking & Security: Network troubleshooting, system hardening, endpoint protection
Experience
System Administrator
Streamline Healthcare Solutions – Kalamazoo, MI Oct 2022 – May 2025
- Secured and managed 200+ endpoints using patch automation and access controls.
- Collaborated with security teams on incident response and system hardening.
- Automated patch deployment and remediation tasks using PowerShell and Bash.
- Monitored system logs and supported vulnerability management efforts.
IT System Manager
Foundation For Behavioral Resources – Augusta, MI Dec 2021 – Present
- Led endpoint/server patching, VM deployments, and access control procedures.
- Performed audits and automated compliance reporting.
- Managed logging infrastructure to ensure accountability and visibility.
IT Technician
FireKeepers Casino – Battle Creek, MI Jun 2019 – Dec 2021
- Provided endpoint protection and patch support for over 500 users.
- Maintained Active Directory user accounts and resolved security escalations.
- Supported OS updates and system hardening tasks.
Projects
Penetration Testing Home Lab
Personal Cybersecurity Lab Ongoing
- Built a full red team simulation lab using VMware with Kali Linux, Kali Purple, Metasploitable2, and Windows 10.
- Practiced privilege escalation, lateral movement, and persistent access techniques.
- Utilized tools such as Nmap, Burp Suite, Hyperion, and BloodHound.
TryHackMe Labs
Cybersecurity Training Platform Ongoing
- Completed 60+ hands-on labs across offensive and defensive security domains.
- Performed vulnerability scans, privilege escalation, and web application exploitation.
- Used tools like Nessus, Wireshark, and Metasploit.
- (Add your rank or TryHackMe username for credibility if desired)
Education
- Bachelor of Science – Information Technology & Networking, Cybersecurity Concentration, DeVry University – Expected 2025
- Associate of Applied Science – Computer Engineering
- Associate of Applied Science – Computer Science
Certifications
- CompTIA Security+
- ISC2 Certified in Cybersecurity (CC)
- Google Cybersecurity Certificate