Prayash Rayamajhi
Washington D.C. Metro Area 571-***-**** *************@*****.***
Motivated and detail-oriented Cybersecurity student at George Mason University, with hands-on experience in threat detection, vulnerability management, and cloud security. Adept in identifying system vulnerabilities, managing incident response, and applying secure coding practices. Seeking entry-level cybersecurity roles where I can leverage my technical, analytical, and soft skills in a collaborative and security-focused environment.
EDUCATION
George Mason University Dec 2025
Bachelor of Applied Science, Cybersecurity
WORK EXPERIENCE
Access Control Officer 2024 – Present
First Coast Security • Sterling, VA
• Administer 24/7 surveillance and access control for enterprise-level data centers.
• Investigate and document physical security incidents, enforcing corrective actions.
• Maintain audit trails of badge access and implement least-privilege policies.
• Conduct routine security assessments to identify procedural and infrastructure gaps.
• Deliver security protocol training to staff and third-party contractors.
• Produce incident response reports and propose system-level security enhancements. SKILLS
Security & Networking: TCP/IP, IDS/IPS, VPN, Firewalls, Wireshark, Security+ concepts Tools: Nessus, Nmap, ZenMap, FTK Imager, Autopsy, Metasploit, AWS Security Hub Programming: Python (automation, scripting), Java, Bash Cloud & Systems: AWS (EC2, S3, IAM), Linux (Ubuntu, Kali), VMware, LAMP stack Soft Skills: Communication, Documentation, Time Management, Cross-Team Collaboration TECHNICAL PROJECTS
Digital Forensics Case Investigation: Used FTK Imager, Autopsy to analyze a flash drive; extracted metadata, verified file integrity (MD5/SHA-1), and followed NIST 800-86 standards. Penetration Testing Lab (VMware): Set up a test lab with bWAPP; ran Nmap and Nessus scans to identify vulnerabilities and misconfigurations; reported findings with CVSS scores. AWS Secure Deployment: Deployed a web app on AWS (EC2, S3, MariaDB); enforced IAM policies, encryption, and compliance controls based on NIST 800-53. Cybersecurity for Small Business (Capstone Project): Built and secured a website for a local business; implemented payment integration, inventory tracking, and layered defense controls.