Welcome to My Cybersecurity Portfolio
Hello! I’m Jose Pacheco, a cybersecurity professional at Walt Disney World and a Master’s candidate in Computer Information Systems (CIS) with a concentration in Cybersecurity. My passion lies in protecting systems, networks, and data from emerging threats. Below, you can explore my educational background, professional experience, projects, and certifications that showcase my journey in the cybersecurity field.
🔐 Professional Statements
I specialize in penetration testing, vulnerability assessment, and system monitoring using a variety of tools. My home lab experiments and academic learning have deepened my expertise in both foundational and advanced security concepts.
📌 Career Goal: To become a Security Analyst, where I can utilize my analytical skills, problem-solving abilities, and passion for learning in real-world cybersecurity challenges.
🎓 Academic Pursuits:
- Master’s in CIS: Focusing on cybersecurity to stay ahead of modern threats.
🎓 Education and Certifications
Degree/Certification | Institution/Issuer | Date Obtained |
---|---|---|
Master’s in Computer Information Systems (CIS) | Bellevue University | Ongoing |
B.S. in Psychology & Criminal Justice | Florida Southern College | 2020 |
CompTIA A+ | CompTIA | June 2024 |
CompTIA Network+ | CompTIA | September 2024 |
CompTIA Security+ | CompTIA | Ongoing |
Class D Security License | Florida Department of Agriculture & Consumer Services | 2022 |
💻 Project Portfolio
These projects demonstrate my skills in penetration testing, vulnerability exploitation, cybersecurity automation, and auditing.
Project Name | Skills Learned | Tools Used | Link |
---|---|---|---|
Nmap Helper | Nmap command execution, network scanning | Python, Nmap | View on GitHub |
The Hasher | Password hashing, cryptography | Tkinter, Python, hashlib | View on GitHub |
Exploiting PostgreSQL on Metasploitable 2 | Database exploitation, vulnerability analysis | Nessus, Metasploit | Read here |
Exploiting FTP Vulnerabilities on Metasploitable 2 | FTP service exploitation, vulnerability analysis | Nessus, Metasploit | Read here |
Setting Up and Configuring Splunk for Monitoring | SIEM setup, security monitoring | Splunk | Read here |
SMB Enumeration and Exploitation in CTFs | SMB enumeration, vulnerability analysis | Nmap, Enum4Linux, Metasploit | Read here |
Exploiting Weak Passwords in OS Security | OS security, privilege escalation | TryHackMe, Linux | Read here |
Defensive Security: Blocking a Malicious IP | Defensive security, network security, IP blocking | Firewall | Read here |
Exploiting Bind Shell Backdoor on Metasploitable 2 | Exploiting backdoors, shell access | Nessus, Metasploit | Read here |
Exploiting NFS Vulnerabilities on Metasploitable 2 | NFS protocol exploitation, vulnerability exploitation | Nessus, Metasploit | Read here |
Exploiting VNC Port 5900 on Metasploitable 2 | VNC protocol exploitation, port scanning | Nessus, Metasploit | Read here |
🔧 Cybersecurity Skills
Skill | Details |
---|---|
Information Security Auditing | NIST Risk Management Framework, CISSP, Security Audits |
Network Security | TCP/IP Model, Network Hardening, Cloud Networks |
Incident Detection & Response | Incident lifecycle, IDS, SIEM tools |
Packet Analysis | Tcpdump, Wireshark, packet capturing |
Automation with Python | Python scripts for cybersecurity tasks and automation |
🛠️ Tools & Technologies
Throughout my cybersecurity journey, I’ve used various tools to enhance security:
- Wireshark – Network traffic analysis
- Nmap - Network scanning
- Splunk – Security monitoring (SIEM)
- Nessus – Vulnerability scanning
- Metasploit – Penetration testing
- Kali Linux – Ethical hacking and security auditing
- Python – Automation and scripting
- Tcpdump – Packet capture and analysis
🌐 Connect with Me
I’m always open to collaboration or discussing cybersecurity. Feel free to connect with me:
Thank you for visiting my portfolio! Stay tuned as I continue to add more certifications and projects.