DARNELL PRICE
Baltimore, Maryland
******@*****.***
CERTIFICATIONS
• CyDefSec Certification – Network Defense, Nucamp
• CyHacker Certification – Ethical Hacking, Nucamp
• CySecurity Certification – Cybersecurity Fundamentals, Nucamp PROJECT-BASED EXPERIENCE
Offensive Security Simulations Kali Linux Environment
• Conducted full-cycle penetration testing against simulated infrastructure using Nmap, Metasploit, Hydra, and Burp Suite
• Identified misconfigurations, outdated software, and exposed services
• Delivered structured vulnerability reports aligned with OWASP and CVE databases Threat Detection and Monitoring Wireshark & Snort
• Captured and analyzed network traffic to identify anomalous behavior
• Parsed packet-level data to reconstruct attack paths and flag malicious payloads
• Applied MITRE ATT&CK techniques to simulate detection capabilities in a SOC context System Hardening & Secure Configuration
• Hardened Ubuntu servers by disabling unnecessary services, applying firewall rules (UFW/IPTables), and configuring SSH for key-based authentication
• Ran Nikto and Lynis scans to validate hardened states
• Documented changes in line with CIS Benchmarks and NIST 800-53 recommendations TECHNICAL PROFICIENCIES
Security Tools & Frameworks:
Nmap, Metasploit, Burp Suite, Wireshark, Nikto, Hydra, John the Ripper, Fail2Ban Operating Systems & Environments:
Kali Linux, Ubuntu, Windows Server (basic exposure) Security Domains:
Vulnerability Assessment & Remediation, Penetration Testing, Network Defense, Secure Configuration, Reconnaissance, Enumeration, Traffic Analysis
Networking & Protocols:
TCP/IP, DNS, HTTP/S, ARP, ICMP, SSL/TLS
Scripting & Automation:
Python (basic scripting), Bash
Cybersecurity Practices & Standards:
OWASP Top 10, MITRE ATT&CK, NIST 800-53, Defense in Depth (DiD), Least Privilege EDUCATION
Nucamp — Cybersecurity Fundamentals
Completed: June 2025
• Executed red team/blue team simulations through guided labs
• Developed practical knowledge of attack vectors, detection strategies, and incident response Other Related Skills and Knowledge
• Built for SIEM Integration: Ready to scale into Splunk or Elastic Stack environments for log analysis and alerting
• Zero Trust Alignment: Familiar with principles of Zero Trust Architecture and Identity-Centric Security
• GRC Awareness: Knowledge of governance frameworks like NIST, ISO 27001, and basic regulatory landscapes (HIPAA, PCI-DSS, GDPR)
• Cyber Ops Readiness: Well-suited for roles in SOC operations, vulnerability management, or junior threat intel positions with growth to mid-level leadership