Skip to content
View BenjaminTetteh's full-sized avatar

Block or report BenjaminTetteh

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
BenjaminTetteh/README.md

Hello, 🖐️ my name is Benjamin Tetteh. I'm an aspiring Cloud Security Professional

👨‍💻 About me:

I’m a passionate and self-motivated learner transitioning into cybersecurity. With over 15 years of experience in communication, event management, and UI/UX design, I bring a creative and analytical perspective to this dynamic field. My journey into cybersecurity is driven by a desire to tackle complex challenges and protect sensitive information from malicious threats. I have developed hands-on expertise in cybersecurity frameworks, vulnerability management, network security, incident response and cloud computing working with tools such as Splunk, Chronicle, Nmap, Wireshark, and Python, alongside navigating Linux systems and filtering data with SQL queries.

I dedicate significant time to continuous learning through platforms like TryHackMe, HackTheBox, YouTube and other educational resources. My passion for technology and problem-solving fuels my growth in the field, as I strive to stay ahead in the ever-evolving cybersecurity landscape. What sets me apart is my determination to tackle challenging problems and deliver effective, secure solutions. I’m excited to apply my skills to safeguard digital environments while advancing as a cybersecurity professional.

🌐 I am committed to expanding my portfolio as I complete more projects. Let’s connect on LinkedIn or email me at [email protected]. I'll be delighted to hear from you.

🔐 Cybersecurity Projects I have done:

  • Conducted an enterprise-wide NIST Cybersecurity framework assessment: Performed a comprehensive NIST CSF assessment on a fictional healthcare provider to identify security gaps, align controls with HIPAA & NIST SP 800-53, developed an incident response plan, and proposed a 12-month security roadmap to enhance GRC expertise.
  • Analyze a vulnerable system for a small business: I conducted a vulnerability assessment for a small business, evaluated the risks of a vulnerable information system and outlined a remediation plan. NIST SP 800-30 Rev. 1 was used to guide the risk analysis of the information system.
  • Conduct a security audit: Performed an internal security audit for a fictional company, assessing its security posture, identifying gaps, and recommending improvements to align with PCI DSS, GDPR, and SOC standards.
  • Incident report analysis: I created an incident report after analyzing a scenario using the National Institute of Standards and Technology's Cybersecurity Framework (NIST CSF).
  • Update a file through a Python algorithm: In this project, I was able to open a file, read the contents within the file, write contents within the file, and created an algorithm that updated a file using Python.
  • Applying filters to SQL queries: I used SQL with filters to perform security-related tasks.
  • Managing Files using Linux commands: I used Linux commands to examine existing permissions and modified them if need be, to authorize the appropriate users and removed any unauthorized access.
  • Phishing attack simulator: Developed a self-initiated phishing attack simulator using GoPhish to assess security awareness, analyze user responses, and enhance phishing defense strategies.
  • Created a Virtual Private Cloud (VPC) Using AWS: Designed and deployed a Virtual Private Clouds (VPC) on Amazon Web Services (AWS) and configured virtual machines within the VPC for testing and operational purposes.
  • Security Incident Report: Documented a cybersecurity incident involving a ransomware attack on a healthcare facility.
  • Change converter: As part of my training from Security Blue Team, I created a python program that converts a given amount of money, expressed in cents, into its equivalent value in dollars, quarters, dimes, nickels, and pennies.
  • Cybersecurity Lab Environment Setup: Built a virtual lab using VirtualBox on MacBook Air M2, with KALI Linux, Metasploitable 2, Nessus Essentials, and WPScan for vulnerability management, malware analysis, and log analysis.

🔐 Experience:

  • ANZ Australia Cybersecurity Management Job Simulation (Forage): Investigated phishing emails and analyzed Packet Capture files using Wireshark and a Hex-editor to identify potential threats.
  • Telstra Cybersecurity Job Simulation (Forage): Gained experience in malware detection, incident response, and implementing firewalls as part of a Security Operations team.
  • PwC Switzerland Cybersecurity Job Simulation (Forage): Conducted risk assessments, recommended security strategies, and demonstrated expertise in network segmentation and firewall configuration.
  • Mastercard Cybersecurity Virtual Experience Program (Forage): Identified and reported phishing threats, assessed areas requiring improved security training, and implemented mitigation procedures.
  • Deloitte Cyber Job Simulation (Forage): Supported a client in a cyber security breach by examining web activity logs and identifying suspect user behaviour.

📃 Training and Certifications:

  • CompTIA Security+ (Expected 3/25)
  • SOC Analyst 1 - Try Hack Me (Expected 3/25)
  • Introduction to Vulnerability Management - Security Blue Team, 2024
  • Google Cybersecurity Professional Certificate, 2024
  • Certified in Cybersecurity - ISC2, 2024
  • Introduction to Cybersecurity - Try Hack Me, 2024
  • Qualys Vulnerability Management Foundation, 2024
  • Cisco Networking Basics, 2024
  • Google, AI Essentials, 2024
  • AWS Cloud Essentials, 2024
  • UX Design - Google, 2023

🥷 Skills and Technologies:

  • Technology: Linux, Python, SQL, Splunk, Wireshark, Virtual Machines, Nessus, WPScan, Firewalls, CISO Assistant, Microsoft 365, Microsoft Defender, Cisco Packet Tracer
  • Concepts/Frameworks: Network Security, Incident Response, Incident Triage, NIST, HIPAA, Network Security, MITRE ATT&CK, Cloud Computing, AWS, Research, HIPAA Compliance, NIST CSF, Identity and Access Management
  • Soft: Curiosity, Analytical, Attention to Detail, Team Player, Communication, Critical Thinking, Self-Motivation, Problem-Solving, Desire to Learn

Pinned Loading

  1. Cybersecurity-Portfolio Cybersecurity-Portfolio Public

    Welcome to my cybersecurity practical projects repository! This collection showcases the hands-on exercises and projects I completed as part of my cybersecurity certifications and personal initiati…

    2