Skip to content
View DMYourz's full-sized avatar

Block or report DMYourz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
DMYourz/README.md

🛡️ Daniel Mochkarovsky | Cyber Security Analyst

CompTIA Security+ NIST 800-171 CMMC 100% Compliant Tampa, FL Profile Views

██████╗ ███╗   ███╗██╗   ██╗ ██████╗ ██╗   ██╗██████╗ ███████╗
██╔══██╗████╗ ████║╚██╗ ██╔╝██╔═══██╗██║   ██║██╔══██╗╚══███╔╝
██║  ██║██╔████╔██║ ╚████╔╝ ██║   ██║██║   ██║██████╔╝  ███╔╝ 
██║  ██║██║╚██╔╝██║  ╚██╔╝  ██║   ██║██║   ██║██╔══██╗ ███╔╝  
██████╔╝██║ ╚═╝ ██║   ██║   ╚██████╔╝╚██████╔╝██║  ██║███████╗
╚═════╝ ╚═╝     ╚═╝   ╚═╝    ╚═════╝  ╚═════╝ ╚═╝  ╚═╝╚══════╝
┌─[dmyourz@security]─[~/portfolio]
└──╼ $ cat mission.txt
[+] Government Compliance Specialist | Threat Hunter | Security Automation Expert
[+] 100% NIST 800-171 Compliance | 40% Vulnerability Reduction | 100+ Endpoints Secured
[+] "Defense in depth, automate everything, leave no system unpatched"

Typing SVG


👨‍💻 About Me

PS C:\Users\Daniel> whoami /all | Select-Object SecurityProfile

╔═══════════════════════════════════════════════════════════════════════╗
║                    SECURITY ANALYST PROFILE                           ║
╚═══════════════════════════════════════════════════════════════════════╝

Name              : Daniel Mochkarovsky
Role              : Cyber Security Analyst I
Company           : SurvTech
Location          : Valrico, FL (Tampa Bay Area)
Clearance         : Government Contractor Compliance Specialist

[CERTIFICATIONS]
├─ CompTIA Security+ (Certified)
├─ Cybersecurity Bootcamp (USF 2025)
└─ A.A. Computer Science (HCC 2020)

[SPECIALIZATIONS]
├─ NIST 800-171 & DFARS 252.204-7012 Compliance
├─ CMMC Level 2 & GCC Low Standards
├─ Vulnerability Assessment & Threat Hunting
└─ Security Automation & SIEM Operations

[IMPACT METRICS]
├─ 🎯 40% Reduction in Critical Vulnerabilities
├─ ✅ 100% Federal Compliance Achievement
├─ 🛡️ 100+ Endpoints/Servers Secured
├─ 📊 5 City Locations Audited
├─ 🔍 10+ Web Apps Deployed with Security Controls
└─ 📡 10+ Log Sources Integrated in SIEM

Philosophy         : "Defense in depth, automate everything, leave no system unpatched"
Current Mission    : Securing government contractor infrastructure | Solo Bitcoin mining on Pi5

CompTIA Security+ certified cybersecurity specialist with proven track record of 100% compliance with NIST 800-171 and DFARS across government contracting environments. Achieved 40% reduction in critical vulnerabilities while managing 100+ endpoints/servers. Expert in security audits, vulnerability assessments, and enterprise security tool management across hybrid Azure and on-premise environments.


🎯 Core Competencies

🔐 Governance & Compliance

  • NIST 800-171 Implementation
  • DFARS 252.204-7012 Compliance
  • CMMC Level 2 Assessment
  • GCC Low Standards
  • Security Audits & Assessments
  • Government Contractor Requirements

🔍 Threats & Vulnerabilities

  • Vulnerability Assessment (Nessus)
  • Network Scanning (Nmap, Wireshark)
  • Threat Hunting & Analysis
  • CVSS Vulnerability Prioritization
  • Risk Assessment & Mitigation
  • Penetration Testing

🛠️ Security Operations

  • SIEM (Wazuh, Splunk)
  • Endpoint Security (Microsoft Intune)
  • N-able RMM Administration
  • Log Analysis & Correlation
  • Incident Response
  • Firewall Configuration

💻 Technology Stack

Security Tools & Platforms

Nessus Wazuh Splunk Nmap Wireshark Microsoft Intune

Cloud & Infrastructure

Azure AWS Docker

Scripting & Development

PowerShell Python Bash Kotlin

Operating Systems & Platforms

Windows Linux Raspberry Pi

Frameworks & Standards

NIST CMMC DFARS


🚀 Featured Projects & Security Labs

┌───────────────────────────────────────────────────────────────────┐
│  >> Initializing Security Project Portfolio...                   │
│  >> Loading comprehensive security implementations...             │
│  >> Status: ████████████████████ 100% Complete                   │
└───────────────────────────────────────────────────────────────────┘

Python Bash

Comprehensive collection of cybersecurity projects, automation scripts, and security lab implementations demonstrating enterprise-grade security operations.

🎯 Project Highlights:

  • Wazuh SIEM Lab: Full platform deployment with 10+ integrated log sources for real-time threat detection and incident response
  • Splunk Threat Detection: Custom dashboards, advanced analytics, and automated threat hunting rules
  • Nmap Automation: Python & NSE-based reconnaissance scripts reducing manual assessment time by 70%
  • Risk Assessment Tools: Vulnerability prioritization using CVSS scoring

Kotlin Android

Advanced Android security research tool for GPS simulation with intuitive floating joystick controls, designed for penetration testing and security assessments.

🎯 Key Features:

  • Real-time location spoofing capabilities
  • Floating joystick interface for precise control
  • Custom coordinate configuration
  • Security research & penetration testing tool
  • Mobile application security testing

🧪 Advanced Security Labs & Research

🛡️ Vulnerability Assessment Lab

[SYSTEMS SECURED]
├─ Wazuh SIEM Deployment
├─ 10+ Log Sources Integrated
├─ Real-time Threat Detection
└─ Automated Incident Response

Deployed comprehensive security monitoring platform with Nessus integration, enabling continuous vulnerability assessment and automated remediation workflows.

📊 Splunk Security Analytics

[THREAT HUNTING ENABLED]
├─ Multi-Source Log Ingestion
├─ Custom Security Dashboards
├─ Automated Alert Rules
└─ Advanced Threat Detection

Configured enterprise-grade log analysis system with custom visualizations and automated threat hunting capabilities for proactive security operations.

🌐 Secure Web Application

[IN DEVELOPMENT]
├─ Modern Security Controls
├─ Robust Authentication
├─ Defense-in-Depth Design
└─ Cutting-Edge Security

Currently developing personal web application implementing modern defensive security controls, secure architecture patterns, and comprehensive security testing.


📈 GitHub Statistics


📊 Security Impact Dashboard

╔════════════════════════════════════════════════════════════════════════════╗
║                      THREAT MITIGATION METRICS                             ║
╠════════════════════════════════════════════════════════════════════════════╣
║                                                                            ║
║  🎯 Vulnerability Reduction      ████████████████░░░░  40% ↓              ║
║  ✅ Compliance Achievement       ████████████████████  100% ✓             ║
║  🛡️ Endpoints Protected          ████████████████░░░░  100+ Systems       ║
║  📍 Locations Secured            ████████░░░░░░░░░░░░  5 Sites            ║
║  🌐 Applications Deployed        ██████░░░░░░░░░░░░░░  10+ Apps           ║
║  📡 SIEM Log Sources             ██████░░░░░░░░░░░░░░  10+ Sources        ║
║                                                                            ║
║  ⚡ Time to Detect (MTTD)         ████████████████████  <5 minutes         ║
║  🚀 Time to Respond (MTTR)       ████████████████░░░░  <30 minutes        ║
║                                                                            ║
╚════════════════════════════════════════════════════════════════════════════╝

Vulnerability Reduction

Federal Standards Met

Systems Protected

Multi-Site Security

🏆 Recent Achievements

Measurable Security Impact:
  VulnerabilityReduction:
    - Reduced critical vulnerability count by 40% through Nessus assessments
    - Managed remediation for 100+ endpoints and servers
    - Implemented automated vulnerability tracking and reporting
  
  ComplianceExcellence:
    - Achieved and maintained 100% NIST 800-171 compliance
    - 100% DFARS 252.204-7012 compliance across all locations
    - Led quarterly audits for CMMC Level 2 and GCC Low standards
    - Multi-location government contractor infrastructure secured
  
  EnterpriseDeployment:
    - Managed 100+ endpoints/servers with Microsoft Intune and N-able RMM
    - Deployed 10+ secure web applications with robust authentication
    - Integrated 10+ log sources into Wazuh SIEM platform
    - Secured hybrid Azure and on-premise environments

Technical Achievements:
  SIEMOperations:
    - Deployed full-scale Wazuh SIEM with real-time threat detection
    - Built Splunk threat hunting system with custom dashboards
    - Automated log analysis and threat detection rules
  
  SecurityAutomation:
    - Engineered automated Nmap reconnaissance scripts with NSE
    - Created Python-based security assessment toolkit
    - Reduced manual scanning time through automation
  
  PersonalProjects:
    - Successfully configured NerdMiner Bitcoin mining on Raspberry Pi 5
    - Currently developing personal web app with cutting-edge security controls

Certifications & Education:
  - CompTIA Security+ Certified
  - Cybersecurity Bootcamp Graduate (USF, 2025)
  - A.A. Computer Science (HCC, 2020)

🔭 Current Mission & Focus Areas

╔═══════════════════════════════════════════════════════════════════╗
║                    ACTIVE SECURITY OPERATIONS                     ║
╚═══════════════════════════════════════════════════════════════════╝

🎯 Primary Operations

[ACTIVE MISSIONS]
├─ 🛡️ Government Compliance
│   ├─ NIST 800-171 Implementation
│   ├─ DFARS & CMMC Level 2
│   └─ Multi-site Audit Leadership
│
├─ 🔍 Vulnerability Management
│   ├─ Nessus Security Assessments
│   ├─ Nmap Network Reconnaissance
│   └─ 40% Vulnerability Reduction
│
├─ 🤖 Security Automation
│   ├─ PowerShell Script Development
│   ├─ Python Security Tooling
│   └─ Automated Threat Detection
│
└─ 📊 SIEM Operations
    ├─ Wazuh Platform Management
    ├─ Splunk Log Analysis
    └─ Real-time Threat Hunting

🚀 Side Projects & R&D

[PERSONAL PROJECTS]
├─ 🌐 Secure Web Application
│   ├─ Modern Security Controls
│   ├─ Robust Authentication
│   └─ Defense-in-Depth Design
│
├─ ⛏️ Bitcoin Mining Research
│   ├─ Raspberry Pi 5 NerdMiner
│   ├─ Performance Optimization
│   └─ Remote Monitoring System
│
├─ 📚 Continuous Learning
│   ├─ Advanced Threat Hunting
│   ├─ Incident Response Tactics
│   └─ Cloud Security (Azure/AWS)
│
└─ 🔧 Tool Development
    ├─ Automation Scripts
    ├─ Security Utilities
    └─ Assessment Frameworks
┌─────────────────────────────────────────────────────────────────────┐
│  💡 "The best defense is a good offense... and really good logging" │
└─────────────────────────────────────────────────────────────────────┘

💼 Professional Experience

┌─[EMPLOYMENT HISTORY]──────────────────────────────────────────────────┐
│                                                                        │
│  [CURRENT] Cyber Security Analyst I @ SurvTech                        │
│  └─ Tampa, FL | Feb 2025 – Present                                    │
│                                                                        │
└────────────────────────────────────────────────────────────────────────┘

🎯 Key Achievements:

  • 40% Reduction: Decreased critical vulnerability count by 40% through systematic Nessus assessments and remediation management across 100+ endpoints/servers
  • 100% Compliance: Achieved and maintained 100% compliance with NIST 800-171 and DFARS 252.204-7012 across multi-location government contracting infrastructure
  • Quarterly Audits: Led security audits for 5 city locations, maintaining CMMC Level 2 and GCC Low standards
  • Enterprise Security: Managed endpoint security with Microsoft Intune and N-able RMM across hybrid Azure/on-premise environments
  • Network Security: Analyzed firewall configurations and network systems to ensure security baseline adherence

🛠️ Technical Responsibilities:

  • Vulnerability assessment and risk management
  • Security compliance auditing and reporting
  • Endpoint security operations and incident response
  • Security policy development and enforcement

┌─[PREVIOUS ROLES]──────────────────────────────────────────────────────┐
│                                                                        │
│  Web Designer / IT Specialist @ Independent Contractor                │
│  └─ Tampa, FL | 2024 – 2025                                           │
│                                                                        │
└────────────────────────────────────────────────────────────────────────┘

🎯 Key Achievements:

  • 10+ Secure Applications: Designed and deployed 10+ secure web applications using HTML, CSS, and JavaScript
  • Security Implementation: Built robust authentication systems, access controls, and proactive security monitoring
  • Client Security: Provided comprehensive IT security consulting and support services

┌─[LEADERSHIP EXPERIENCE]───────────────────────────────────────────────┐
│                                                                        │
│  IT Director / Manager @ OTM Venture Capital Group                    │
│  └─ Tampa, FL | 2022 – 2024                                           │
│                                                                        │
└────────────────────────────────────────────────────────────────────────┘

🎯 Key Achievements:

  • IT Leadership: Led IT operations and security oversight for 15-person organization
  • Policy Development: Developed and enforced security policies for user access, incident response, and system administration
  • Windows Environment: Managed security for Windows infrastructure and system administration

📫 Connect With Me

LinkedIn Email GitHub Phone


🎯 Security Philosophy

╔═══════════════════════════════════════════════════════════════════════════╗
║                                                                           ║
║  "Security is not a product, but a process." - Bruce Schneier            ║
║                                                                           ║
║  "The only truly secure system is one that is powered off, cast in a     ║
║   block of concrete and sealed in a lead-lined room with armed guards."  ║
║   - Gene Spafford                                                         ║
║                                                                           ║
║  "Defense in depth, automate everything, leave no system unpatched."     ║
║   - DMYourz                                                               ║
║                                                                           ║
╚═══════════════════════════════════════════════════════════════════════════╝

Typing SVG


💬 Let's Connect & Collaborate

┌─[dmyourz@security]─[~/contact]
└──╼ $ cat contact_info.txt
[+] Open to: Security Consulting | Collaboration | Knowledge Sharing
[+] Interests: Threat Hunting | Security Automation | Cloud Security
[+] Always: Learning | Building | Securing

⭐ If you find my work valuable, star my repositories! 🤝 Open to collaborating on security projects and research 📧 Feel free to reach out for discussions on cybersecurity trends and best practices


 _____ _                 _          __                                       
|_   _| |__   __ _ _ __ | | _____  / _| ___  _ __                          
  | | | '_ \ / _` | '_ \| |/ / __|| |_ / _ \| '__|                         
  | | | | | | (_| | | | |   <\__ \|  _| (_) | |                            
  |_| |_| |_|\__,_|_| |_|_|\_\___/|_|  \___/|_|                            
                                                                             
     _     _   _   _                                                        
    | |   | |_| |_(_)_ __   __ _                                           
    | |   | __| __| | '_ \ / _` |                                          
    | |___| |_| |_| | | | | (_| |                                          
    |_____|\__|\__|_|_| |_|\__, |                                          
                            |___/                                           
  ____                           ____                          _         _ 
 / ___|  ___  ___ _   _ _ __ ___|  _ \  ___  ___ ___ _ __   | |_    _ | |
 \___ \ / _ \/ __| | | | '__/ _ \ | | |/ _ \/ __/ _ \ '_ \  | (_)  (_)| |
  ___) |  __/ (__| |_| | | |  __/ |_| | (_) \__ \  __/ | | | | |_    _ |_|
 |____/ \___|\___|\__,_|_|  \___|____/ \___/|___/\___|_| |_| |_(_)  (_)_(_)

Wave

Last Updated: 2025 | Built with: ❤️ and ☕ | Powered by: Endless curiosity

Popular repositories Loading

  1. android-location-spoofer android-location-spoofer Public

    Android app that simulates GPS locations with a floating joystick for testing and security research.

    Kotlin 2

  2. CyberSecurity-Portfolio CyberSecurity-Portfolio Public

    Python

  3. DMYourz DMYourz Public

    Profile

  4. pihole-network-adblocker pihole-network-adblocker Public

  5. wedding wedding Public

    JavaScript