EG

Eldon Gabriel

Security Ops & GRC Analyst | SysAdmin-Driven Risk Reduction | Practical Security Portfolio

About

I approach cybersecurity as both a technical craft and a business-critical discipline, combining system administration insight with a security-focused mindset. Through scenario-driven projects, I’ve led GRC risk assessments that map vulnerabilities to business impact, created realistic mitigation plans, and conducted forensic investigations tracing unauthorized access. I produce executive-ready reports that turn technical findings into clear, actionable strategies. My portfolio demonstrates both hands-on execution and strategic thinking, positioning me to strengthen security operations, reduce risk, and deliver solutions that work in real environments.

Skills

PythonRuby

Experience

2025 — 2025
Cybersecurity Training & Project-Based Learning at Mosse Cyber Security Institute

I completed an intensive, hands-on cybersecurity program designed to build practical skills across threat detection, operational security, and governance. In threat detection and reconnaissance, I conducted both active and passive reconnaissance to map attack surfaces and identify potential entry points. My operational security work included analyzing malware using YARA rules and applying core security principles through scenario-based simulations that mirrored real-world incidents.

In the governance and compliance space, I developed professional security artifacts—such as password policies and risk matrices—that support secure environments and align with industry best practices. This combination of technical investigation, security controls, and policy development provides a balanced foundation to contribute meaningfully to cybersecurity operations.

2025 — 2025
Cybersecurity Training & Project-Based Learning at Mosse Cyber Security Institute

In this project-based training, I apply system administration skills to design, deploy, and secure IT environments that reflect real-world complexity. I’ve configured and managed virtualized Windows and Linux systems, built secure network architectures, and implemented hardening measures such as Group Policy Objects (GPOs) and firewall rules. My work also includes in-depth Unix/Linux administration and troubleshooting, strengthening my ability to identify and resolve issues across diverse platforms.

This hands-on approach bridges core IT fundamentals with advanced cybersecurity practices, ensuring every task—whether deploying a server or locking down a network—is backed by both technical precision and security-first thinking.

Case Studies

Incident Handler’s Log – Real-World Cybersecurity Labs & Reports

A portfolio of 75+ reports across threat detection, malware analysis, networking, YARA, OpenVAS, and lab deployments. Hands-on problem-solving, log analysis, and documentation.

Education

2024 — 2025
Google IT Support Professional
Coursera: Google
2024 — 2025
Google Cybersecurity Professional
Coursera: Google
2025 — 2025
Cybersecurity Risk Management Framework Specialization
Coursera: InfoSec
2024 — Present
Certified in Cybersecurity
ISC2
2025 — 2025
MICS - Introduction to Cyber Security
Mosse Cyber Security Institute

Hunt me via

Linkedin
Twitter

This theme is a tribute toReadCV