Skip to content
View CySAJohnseun's full-sized avatar

Block or report CySAJohnseun

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
CySAJohnseun/README.md

Hello, I'm Johnson!

Johnson is a results-oriented professional with a proven track record in impactful contributions at a leading retail automation software company, specializing in securing high-demand products by bypassing Bot Detection Systems designed by major CDN companies. Now actively seeking entry-level roles in Cybersecurity, he aims to apply his expertise, contribute to digital security, and address emerging challenges. Fueled by a newfound passion for cybersecurity, Johnson is committed to continuous learning through certifications, professional guidance, home lab projects, and active participation in monthly Cybersecurity meetups. His journey in Information Technology has sparked a dedication to Cybersecurity, leading him to pursue a second bachelor's degree focusing on Cybersecurity and Information Assurance.

Skills

Skill Associated Project
SIEM Implementation and Log Analysis Nessus Vulnerability Scanner
Network Traffic Monitoring and Attack Detection Honeypot and Attack Map
Security Automation with Shuffle SOAR SOC Automation Lab
Incident Response Planning and Execution SOC Automation Lab
Case Management with TheHive SOC Automation Lab
Scripting and Automation for Threat Mitigation SOC Automation Lab

Tools

Network

Endpoint

SIEM

Certifications

Projects

  • Detection Lab
  • SOC Automation Project

Popular repositories Loading

  1. Nessus-Vulnerability-Scanner Nessus-Vulnerability-Scanner Public

    Demonstrating Nessus installation on Kali Linux, we conduct vulnerability scans on a Metasploitable system, highlighting Nessus's vital role in real-world cybersecurity, enhancing understanding of …

    4 1

  2. LimaCharlie-C2-EDR-Telemetry LimaCharlie-C2-EDR-Telemetry Public

    To gain hands-on experience generating a command-and-control (C2) payload using Sliver, a post-exploitation framework, on a Linux virtual machine (VM). This payload will then be transferred to a Wi…

    1

  3. JohnseunProjects JohnseunProjects Public

  4. T-Pot-Honeypot-and-Attack-Map T-Pot-Honeypot-and-Attack-Map Public

  5. CySAJohnseun CySAJohnseun Public

  6. SplunkBossOfTheSocv3 SplunkBossOfTheSocv3 Public