Franks | Portfolio

Showcasing what I Build, Break, and Create.

TryHackMe Stats
LinkedIn TryHackMe GitHub

πŸ‘‹-Welcome to My Portfolio!

About Me

I’m a cybersecurity professional with hands-on experience supporting enterprise SOC operations for a large public-sector organization. I work daily with SIEM, EDR, and network security tools to detect threats, analyze phishing campaigns, correlate indicators of compromise, and support incident response across thousands of endpoints and users.

My background combines formal cybersecurity education with real-world defensive operations, including threat hunting, log analysis, security automation, and endpoint hardening aligned with CIS and CJIS standards. I enjoy turning raw security data into actionable insightsβ€”whether that’s through Splunk dashboards, PowerShell automation, or improving detection and response workflows.

I’m actively building and documenting projects in my GitHub portfolio to demonstrate practical security skills, continuous learning, and a strong blue-team mindset, with a focus on SOC operations, incident response, and cyber defense.


πŸŽ“ Education

Bachelor of Science in Cybersecurity & Information Assurance (In Progress)

Western Governors University β€” Salt Lake City, UT
Expected Graduation: May 2026

Focused on defensive security, incident response, and cloud security. Coursework emphasizes Linux administration, cryptography, network defense, security governance, and hands-on cyber defense aligned with CySA+ and PenTest+ domains.

Associate of Science in Cybersecurity

Pasadena City College β€” Pasadena, CA
Graduated: December 2024 | GPA: 3.6

Completed extensive hands-on labs in ethical hacking, digital forensics, Windows and Linux administration, enterprise networking, Python scripting, and SQL.
Earned Certificates of Achievement in Cybersecurity, Systems & Network Administration, and Help Desk.

Department of Homeland Security (DHS) β€” Cybersecurity Analyst Seminar

Completed: January 2026

Completed DHS-aligned cybersecurity training focused on federal threat detection, risk analysis, and incident response. Topics included network protocol analysis (TCP/IP, SMB), phishing and social engineering attacks, malware analysis, MITRE ATT&CK TTP identification, and core security principles (CIA triad).


πŸ“œ Certifications & Competitions

Certifications

Competitions






πŸ’» Showcasing my Homelab and Projects

πŸ”Ž-Splunk Detection Queries

🌐-Network Lab

More Coming Soon


🧠 Technical Skills

πŸ” Security Domains βš™οΈ Tools, Platforms & Technologies
πŸ–₯️ Operating Systems Windows 10/11, Linux, macOS, Chrome OS
πŸ‘€ Identity & Access Management (IAM) Active Directory, Azure AD, Conditional Access, PowerShell
πŸ›‘οΈ Endpoint Detection & Response (EDR) SentinelOne, Carbon Black, Malwarebytes Nebula
πŸ“Š SIEM & Security Monitoring Splunk, Microsoft Defender, Proofpoint TRAP
🚨 Incident Response & Malware Analysis ANY.RUN, VirusTotal, Hybrid Analysis, Joe Sandbox, Intezer Analyze
πŸ“¬ Email & Phishing Analysis MXToolbox, MailHeader Analyzer, DNSChecker, Proofpoint Awareness
πŸ”Ž Threat Intelligence & OSINT MITRE ATT&CK, Cisco Talos, SANS ISC, Threat Connect
🌐 Network & Protocol Analysis Wireshark, Nmap, Tcpdump
πŸ•΅οΈ OSINT & Exposure Discovery Shodan, Have I Been Pwned, DomainTools, WHOIS, MXToolbox
🧱 Hardening, Baselines & Compliance CIS Benchmarks, Windows Security Baselines, CJIS Compliance
βš™οΈ Automation & Scripting PowerShell, Intune, SQL
πŸ“‘ Network & Endpoint Management Intune, SentinelOne Dynamic Groups
πŸ“ˆ Dashboards & Reporting Splunk Custom Dashboards, SentinelOne Policy Matrix, Excel, SharePoint
πŸ” Account & Credential Security Active Directory Audits, On-Prem Password Manager

🧠 Soft Skills