cv

Listed below are my professional qualifications, education, skills and interests!

General Information

Full Name Metassassin
Age 24
Location Dallas, TX, USA
Languages English, Spanish

Education

  • 2024
    Master of Science - Cybersecurity and Information Assurance
    Western Governors University
    • My pursuit of a Master of Science in Cybersecurity and Information Assurance (MSCSIA) was fueled by a desire to further expand my expertise and contribute meaningfully to the security landscape. This advanced degree demanded rigorous research, strategic thinking, and a commitment to continuous growth. It deepened my understanding of complex security architectures, governance, and compliance while honing my leadership skills. Through hands-on projects and in-depth analysis, I learned to tackle multifaceted security challenges with resilience and creativity. The program fostered my determination to not only keep pace with evolving threats but to anticipate them, solidifying my commitment to making a lasting impact in the field of cybersecurity.
  • 2023
    Bachelor of Science - Cybersecurity and Information Assurance
    Western Governors University
    • After completing my degree in Computer Information Systems, I chose to pursue a Bachelor of Science in Cybersecurity and Information Assurance (BSCSIA) to deepen my understanding of the increasingly complex world of information security. This program required discipline and determination, pushing me to constantly evolve my technical knowledge and critical thinking skills. I embraced the challenge, driven by a deep curiosity about how systems work and how vulnerabilities can be mitigated or eliminated. This degree not only solidified my technical foundation but also strengthened my ability to adapt to new technologies and security paradigms. It instilled in me the importance of staying vigilant and persistent in an ever-changing field.
  • 2021
    Associate of Applied Science - Computer Information Systems
    Aims Community College
    • I pursued a degree in Computer Information Systems with a focus on cybersecurity because, much like an artist, I am driven by a desire to craft, but in this case, it’s about constructing secure systems that protect critical information. Just as art requires creativity, cybersecurity demands innovative thinking and adaptability to stay ahead of ever-evolving threats. Both disciplines call for precision, attention to detail, and an ability to see things from different perspectives—whether it's interpreting a digital landscape or analyzing a complex network. The rigor of cybersecurity, like that of Studio Art, involves problem-solving, resilience, and the willingness to constantly refine and improve. In the same way an artist captures vision in form, I’m passionate about translating complex security challenges into elegant, functional solutions that safeguard the digital world.
  • 2020
    Associate of Art - Studio Art
    Aims Community College
    • I pursued a Studio Art degree because I am driven by the profound need to create, express, and communicate in ways that transcend words. The field of art demands not only creativity, but also discipline, attention to detail, and the ability to see the world from unique perspectives. It requires resilience in the face of challenges, adaptability to experiment with new techniques, and the capacity to critically analyze and refine one’s work. As an artist, I’ve cultivated problem-solving skills, a sharp eye for aesthetics, and an openness to explore both the known and unknown. Studio Art is not just about producing visuals—it is about translating emotion, narrative, and vision into something tangible, a skillset that is valuable across many fields. A focus in photography and drawing.

Experience

  • 2022 - Current
    Senior Cybersecurity Analyst
    Redacted for Privacy - Global Food Manufacturer
    • Responsibilities
      • Incident response planning/incident response (war room, playbooks, IRP)
      • Web penetration testing and reporting
      • Security policy and procedure creation
      • Threat hunting
      • Quarterly security awareness articles
      • Project management and change control
      • Security alert response
      • Table-top exercise planning, creation and delivery
      • Endpoint security analysis
      • Physical security
      • Computer forensics
      • Managing AV/EDR/XDR and SIEM solutions
      • Managing in-house lab and documentation (Proxmox with kali linux, parrot os, ubuntu, etc.)
      • Threat intelligence - managing RSS feeds
      • Maintaining IPS IP address blocklist
      • Ticket queue management
    • Proficiencies and Skills
      • Python scripting
      • Training team members
      • Conducting inverviews
      • Purple teaming
      • NMAP, Metasploit, FTK, etc.
      • Elastic SIEM management
      • Public speaking
      • Social engineering - Face-to-face engagement
      • Vishing
      • Blackbox penetration testing
      • Leading investigations
      • Risk assessment
      • Azure cloud
      • Windows, Linux and MacOS
      • Cyber kill chain by Lockheed Martin
      • NIST 2.0, SEC, GDPR
  • 2021 - 2022
    Security Administrator
    Redacted for Privacy - Global Food Manufacturer
    • Responsibilities
      • AD account creation, maintenance and termination
      • AD access control
      • Application access control
      • File server access
      • Project management
      • SAP security
      • Security alert response
      • Password policy control
      • Security awareness training
      • Vulnerability scanning
      • Azure cloud security
      • IPAM administration
      • Managing EDR and SIEM solution
      • Ticket queue management
    • Proficiencies and Skills
      • SAP security
      • Active directory
      • IoT penetration testing
      • Nessus
      • Public speaking
      • Windows and Linux
      • Bitlocker
      • NIST
      • Training new employees
  • 2018 - 2021
    Desktop Support Technician
    Redacted for Privacy - Global Food Manufacturer
    • Responsibilities
      • Desktop, tablet, laptop, thin client, layer 1 & 2 networking, phone, television and conference room troubleshooting
      • Antivirus solution management
      • Endpoint forensic imaging
      • Endpoint golden image creation, review and validation
      • Application management
      • Endpoint hardware replacement
      • Ethernet cable termination and punchdowns
      • Supporting five major locations - headquarters, trucking division office, warehouse, hangar and plant-based food division office.
      • Managing Windows OS security updates and versioning
      • SAP ordering/Inventory management
      • Ticket queue management
      • Malware removal
      • Evaluation and selection of standard laptops for the company
    • Proficiencies and Skills
      • Legal hold
      • Proficiency in many applications
      • Microsoft applications
      • Microsoft windows
      • File recovery
      • Secure equipment disposal
      • Endpoint password bypassing
      • Working with international employees
      • Training new employees
      • SCCM

Certifications

  • 2024
    • ISC2 Certified Information Systems Security Professional (CISSP)
  • 2023
    • CompTIA A+
    • CompTIA Project+
    • CompTIA Advanced Security Practitioner (CASP+)
    • EC-Council Certified Ethical Hacker (CEH)
    • LPI Linux Essentials
    • ISC2 Systems Security Certified Practitioner (SSCP)
    • ISC2 Certified Cloud Security Professional (CCSP)
  • 2022
    • CompTIA Security+
    • CompTIA CySA+
    • CompTIA PenTest+
    • CompTIA Cloud+
  • 2021
    • CompTIA IT Fundamentals (ITF+)
    • CompTIA Network+

Conferences Attended

  • 2024
    • DEF CON 32
    • RSA 2024
    • Dallas Cyber Summit
  • 2022
    • DEF CON 30

Interests

  • Hobbies: Capture the Flag events, Ethical Hacking, Locksport, Botany, Chess, Cardistry, Computer Gaming, Running/Hiking, Fishing, etc.