Aspiring Cybersecurity Analyst (Security Analyst), passionate about defending digital assets and building resilient systems. I am passionate about technology, code and pushing myself to levels I haven’t achieved before, even if it may be difficult at times.
About Me
I am an analytical, solution orientated thinker (that deals in solutions, not probleams) with a fascination for understanding how things work. I have a high value for ethics as well as the ability to constantly learn & excersise that knowledge. What draws me to Cybersecurity is both the ‘Sword & Shield’ aspects respectfully. From the Sword aspect of it I get to ethically test my skills & knowledge through retriving sensitive information to asssit the company in it's endeavours, while on the other hand I also get to be apart of the Shield aspect of it where I would be protecting the company from all threats both internal & external.
Key Skills
- Security Concepts: Threat & Risk Analysis, Vulnerability Management, Incident Response, NIST Cybersecurity Framework, MITRE ATT&CK Framework, CIA Triad
- Tools & Platforms: Linux, Wireshark, SIEM (e.g., Splunk/Chronicle), SQL, Git/GitHub
- Scripting & Automation: Python (for log analysis, automation)
- Networking: TCP/IP, Network Protocols, Network Hardening
- Soft Skills: Problem Solving, Critical Thinking, Technical Communication, Documentation
This section showcases my hands-on projects, which align with the curriculum of the Google Cybersecurity Professional Certificate. Each project is designed to demonstrate practical skills and a methodical approach to solving security challenges.
Project Title | Course Reference | Key Skills Demonstrated |
---|---|---|
Botium Toys Security Audit | Course 2: Play It Safe: Manage Security Risks | Risk Management, Threat Identification, NIST Framework |
Network Traffic Analysis & Hardening | Course 3: Connect and Protect: Networks and Network Security | Wireshark, Packet Analysis, Network Security |
Linux & SQL Security Analysis | Course 4: Tools of the Trade: Linux and SQL | Linux Command Line, SQL Queries, Log Analysis |
Vulnerability Management & Remediation Plan | Course 5: Assets, Threats, and Vulnerabilities | Vulnerability Management, Threat Modeling, MITRE ATT&CK Framework |
Incident Response Playbook for Ransomware | Course 6: Sound the Alarm: Detection and Response | Incident Response Lifecycle, Containment, Post-Incident Analysis |
Automated Log Parser with Python | Course 7: Automate Cybersecurity Tasks with Python | Python Scripting, Automation, File I/O, Parsing |
Certifications & Links
- Google Cybersecurity Professional Certificate
- LinkedIn: https://www.linkedin.com/in/ziphozonke-mashaba/