root@tony:~$ _
Cyber Security Analyst

Tony

|

Passionate about ethical hacking, network security, and vulnerability assessment.

0 Projects
0 Certifications
0 Tools Mastered
Scroll Down

About Me

Available for Internship
East Africa
Cybersecurity Student
Open to Opportunities
about_tony.sh

$ cat about.txt

Hi, I'm Tony — a dedicated and curious cybersecurity enthusiast currently building a strong foundation in offensive and defensive security practices. I am passionate about understanding how systems can be compromised and how to defend them effectively.

My journey into cybersecurity started with a fascination for how networks communicate and how vulnerabilities can be discovered and patched. I actively practice in lab environments using tools like Kali Linux, Metasploit, and Wireshark to sharpen my skills in penetration testing and network analysis.

I am actively seeking an internship or attachment opportunity where I can apply my skills, contribute to real-world security challenges, and grow alongside experienced professionals in the field.

$ _

Network Security Penetration Testing Vulnerability Scanning Linux / Kali Linux Nmap Wireshark Metasploit n8n Automation

Technical Skills

Offensive Security

Penetration Testing75%
Metasploit Framework70%
Ethical Hacking72%

Network & Recon

Nmap85%
Wireshark80%
Network Security78%

Systems & Tools

Linux / Kali Linux82%
Vulnerability Scanning76%
Firewall Configuration68%

Automation & SOAR

n8n Automation70%
Workflow Orchestration68%
Security Automation65%
Nmap
Wireshark
Metasploit
Kali Linux
Burp Suite
Snort IDS
Bash Scripting
SQLMap
n8n

My Projects

Nmap Scan
Completed

Vulnerability Scan Using Nmap

Conducted a comprehensive network vulnerability assessment on a controlled lab environment. Identified open ports, running services, and potential attack vectors using Nmap's scripting engine (NSE).

Nmap Kali Linux Bash
Wireshark Analysis
Completed

Network Traffic Analysis with Wireshark

Captured and analyzed live network packets to identify suspicious traffic patterns, unencrypted credentials, and protocol anomalies. Documented findings in a structured security report.

Wireshark TCP/IP Packet Analysis
Firewall Config
Completed

Firewall Configuration Lab

Designed and implemented firewall rules using iptables on a Linux system to filter inbound and outbound traffic. Tested rule effectiveness against simulated attack scenarios and documented the security policy.

iptables Linux Network Defense

Certs & Training

Google Cybersecurity Certificate

Google / Coursera

Foundations of cybersecurity, network security, Linux, SQL, and security tools.

Network Security Linux SIEM
Completed

TryHackMe – Pre-Security Path

TryHackMe

Hands-on labs covering networking, web fundamentals, and Linux basics for security.

Hands-on Labs Networking Web Security
Completed

TryHackMe – Jr Penetration Tester

TryHackMe

Penetration testing methodology, exploitation techniques, and post-exploitation.

Pen Testing Exploitation Metasploit
In Progress

Cisco Networking Essentials

Cisco NetAcad

TCP/IP fundamentals, subnetting, routing protocols, and network troubleshooting.

TCP/IP Routing Subnetting
Completed

Ethical Hacking Essentials (EHE)

EC-Council / Coursera

Introduction to ethical hacking, footprinting, scanning, enumeration, and exploitation.

Ethical Hacking Footprinting Enumeration
Completed

Get In Touch

Open to internship opportunities, collaborations, and cybersecurity discussions.

Currently available for internship / attachment
Message sent successfully!