I’m dedicated IT and Systems Administration professional with a passion for cybersecurity. I thrive on challenges and have a strong commitment to continuous learning. With a responsible and attentive approach.
My professional expertise in system administration, combined with my enthusiasm for ongoing development, enables me to effectively contribute to the field of technology.
Continuously grow as a professional, leveraging my passion for cybersecurity to create secure and efficient digital environments. I strive to embrace new challenges and learning opportunities, constantly enhancing my skills to stay ahead in the ever-evolving field of technology.
My purpose is to create and sustain secure, reliable, and efficient IT systems that empower organizations to achieve their goals. I am committed to applying my knowledge in systems administration and cybersecurity to protect digital assets and optimize technological operations.
Years Of Experience
I delve into the synergy of electrical engineering and computer science, mastering the art of designing and developing advanced computer systems and hardware. I explore programming, algorithms, computer architecture, digital systems, embedded systems, and network design, equipping myself to craft innovative and efficient technology solutions
Focuses on advanced training in managing and securing IT systems and networks. It covers in-depth topics such as server administration, network infrastructure, cybersecurity protocols, data protection, and incident response. Graduates are equipped to handle complex IT environments, implement robust security measures, and protect organizations from cyber threats
Focuses on training individuals in the installation, configuration, and maintenance of microcomputer systems and local networks. It covers essential skills such as hardware and software setup, network security, troubleshooting, and providing technical support to ensure efficient and secure IT environments
Develop fundamental knowledge, critical thinking skills, and personal and social responsibility
I developed a solid foundation in ethical hacking through this 53-hour course. I learned to detect and exploit vulnerabilities, perform network analysis, and report findings effectively. This step-by-step approach provided the practical skills and confidence needed to apply ethical hacking techniques in real-world scenarios. Through hands-on practice, I gained the skills and confidence to excel in cybersecurity.
The course covered essential topics such as system installation, command-line proficiency, file system management, user and permissions administration, shell scripting, and system security. By the end of the course, I was equipped with the skills to efficiently manage and troubleshoot Linux systems, ensuring robust and secure operations.
I learned to master Python from scratch, starting with its fundamentals, including syntax, data structures, and error handling. I advanced to Object-Oriented Programming (OOP) concepts. This hands-on course taught me to build practical projects while sharpening my skills in penetration testing, web scraping, and developing custom cybersecurity tools.
This certification demonstrates my ability to establish, implement, maintain, and continually improve an information security management system (ISMS) according to internationally recognized standards. It equips me with the knowledge to identify security risks, implement controls to mitigate these risks, and ensure compliance with legal, regulatory, and contractual requirements.
Managing Windows, Linux, and macOS operating systems. From servers to laptops.
User account and permission management: on-premise environments and cloud: Azure, AWS & Google
I build customized software with specialization in: Python, Bash, Powershell, C, PHP, HTML, CSS.
Providing comprehensive user training and technical support
Creating detailed and organized project documentation
Basic Cloud Computing: CI/CD, AWS Cloud Administration & Google Cloud, Devops