π Whoami
Hello! Iβm Suleiman Yusuf Gacheru, a passionate Cybersecurity Specialist focused on network security and incident response. I recently completed the Google Cybersecurity Professional Certificate and am eager to apply, improve, and grow my skills in real-world challenges.
In addition to cybersecurity, I have experience in full-stack web development using Ruby, JavaScript, Rails, and React, which gives me a solid foundation in securing applications from the ground up. Iβm continuously learning and open to collaboration. Feel free to explore my projects or reach out! π Skills Technical Skills
Cybersecurity Tools: Wireshark, Nmap, Metasploit, Nessus
SIEM Tools: Splunk, Google Chronicle
Programming Languages: Python, Bash scripting
Operating Systems: Kali Linux, Windows
Security Concepts: Network traffic analysis, Vulnerability scanning, Packet Sniffing, Incident response
Development: Ruby on Rails, React
Soft Skills
Stakeholder communication
Detail-oriented
Planning and organizing
Effective communication and escalation
π Certifications
Google Cybersecurity Professional Certificate
Microverse Full Stack Web Development
π οΈ Projects
- File Permission in Linux
Description: Organized and updated file permissions on Linux. Skills Demonstrated: User Authorization, File Authorization, Linux line-command Tools Used: Linux line-command, Nano Editor GitHub 2. Network Security Tool
Description: Built a Python-based tool to protect home and small office networks. Features: Identify devices, manage bandwidth, blacklist/whitelist, set-timers for devices Skills Demonstrated: Network security, risk mitigation Tools Used: Python3, Network logs, Kali Linux GitHub 3. SQL for Database Management and Filtering
Description: Database querying using SQL. Skills Demonstrated: DB management, SQL GitHub π GitHub Stats
Suleiman's GitHub Stats
Top Languages βοΈ Blog / Writeups
- Understanding the TCP/IP Model
Summary: Explained what the TCP/IP model is and why itβs important for people getting started with their cybersecurity careers or networking. Read More 2. Deciphering Crucial Logs: Firewall, Network, and Server Logs
Summary: Explained logs for networks, servers, and firewalls. Read More π¬ Contact
Feel free to reach out for collaborations or job opportunities:
Email LinkedIn GitHub π‘ Fun Fact
When Iβm not securing networks or coding, I enjoy photography and exploring new technologies. I believe in lifelong learning and constantly strive to improve my skills.
Thanks for stopping by! Letβs build something amazing together. π