Eldon Gabriel
Security Ops & GRC Analyst | SysAdmin-Driven Risk Reduction | Practical Security Portfolio
About
I approach cybersecurity as both a technical craft and a business-critical discipline, combining system administration insight with a security-focused mindset. Through scenario-driven projects, I’ve led GRC risk assessments that map vulnerabilities to business impact, created realistic mitigation plans, and conducted forensic investigations tracing unauthorized access. I produce executive-ready reports that turn technical findings into clear, actionable strategies. My portfolio demonstrates both hands-on execution and strategic thinking, positioning me to strengthen security operations, reduce risk, and deliver solutions that work in real environments.
Skills
Experience
I completed an intensive, hands-on cybersecurity program designed to build practical skills across threat detection, operational security, and governance. In threat detection and reconnaissance, I conducted both active and passive reconnaissance to map attack surfaces and identify potential entry points. My operational security work included analyzing malware using YARA rules and applying core security principles through scenario-based simulations that mirrored real-world incidents.
In the governance and compliance space, I developed professional security artifacts—such as password policies and risk matrices—that support secure environments and align with industry best practices. This combination of technical investigation, security controls, and policy development provides a balanced foundation to contribute meaningfully to cybersecurity operations.
In this project-based training, I apply system administration skills to design, deploy, and secure IT environments that reflect real-world complexity. I’ve configured and managed virtualized Windows and Linux systems, built secure network architectures, and implemented hardening measures such as Group Policy Objects (GPOs) and firewall rules. My work also includes in-depth Unix/Linux administration and troubleshooting, strengthening my ability to identify and resolve issues across diverse platforms.
This hands-on approach bridges core IT fundamentals with advanced cybersecurity practices, ensuring every task—whether deploying a server or locking down a network—is backed by both technical precision and security-first thinking.
Case Studies
Incident Handler’s Log – Real-World Cybersecurity Labs & Reports
A portfolio of 75+ reports across threat detection, malware analysis, networking, YARA, OpenVAS, and lab deployments. Hands-on problem-solving, log analysis, and documentation.
Education
Coursera: Google
Coursera: Google
Coursera: InfoSec
ISC2
Mosse Cyber Security Institute
Featured Blogs
Hunt me via
This theme is a tribute toReadCV