About Me
My name is Christian, and I am a 4th year Computer Engineering Student with an emphasis on computer networking and security. I am passionate about cybersecurity and am actively pursuing opportunities in this field. My interest in cybersecurity is driven by curiosity about how systems work, how they can be protected, and how threats can be mitigated. I am constantly expanding my knowledge through hands-on learning, certifications, and practical projects. This repository showcases my technical skills, hands-on projects, and certifications, serving as a comprehensive digital portfolio that demonstrates my growth in the field of cybersecurity.
Education
[2022-2026] • University of California Santa Cruz
- Bachelor of Science in Computer Engineering • Concentration: Networks
- Relevant Coursework: Data Structures & Algorithms, Computer Networking, Computer Security, Computer Systems & Design, Cryptography, Software Engineering
Technical Skills
Programming Languages
- Python
- HTML/CSS/JavaScript
- C/C++
- Bash
- MySQL
- Swift
Operating Systems & Tools
- Linux(Kali, Ubuntu), Windows
- Windows Active Directory - domain setup, user/group policies, authentication, and access control
- PowerShell - automation of administrative tasks, log analysis, security baselining
Concepts and Frameworks
- Zero Trust Architecture: Designing systems with the assumption that threats exist both inside and outside the network
- Vulnerability Management: Identifying, assessing, and mitigating vulnerabilities in systems and networks
- Incident Response Lifecycle: Detection, identification, containment, eradication, recovery, and lessons learned
- Secure Software Development Lifecycle (SDLC): Security measures integrated into each phase of software development
- Networking (TCP/IP, Firewalls, VPN, DNS): Understanding and securing network protocols, configuring and maintaining firewalls, securing virtual private networks
- Threat Intelligence: Collecting, analyzing, and disseminating actionable information regarding potential cyber threats
- Risk Management: Identifying, assessing, and prioritizing risks to systems and data, followed by implementation of mitigation measures
- Advanced Persistent Threats (APT): Identifying and defending against prolonged and targeted cyberattacks
- Red Team / Blue Team Exercises: Offensive (Red) and defensive (Blue) security practices to simulate and defend against real-world attacks
- Social Engineering: Manipulating people to gain unauthorized access to systems or data
Certifications
- [CompTIA Security+] Completed: January 2026 • See More
- [TryHackMe CyberSecurity 101] Completed: August 2025 • See More
Contact Information
Email: Email
GitHub: GitHub
LinkedIn: LinkedIn