██████╗ ███╗ ███╗██╗ ██╗ ██████╗ ██╗ ██╗██████╗ ███████╗
██╔══██╗████╗ ████║╚██╗ ██╔╝██╔═══██╗██║ ██║██╔══██╗╚══███╔╝
██║ ██║██╔████╔██║ ╚████╔╝ ██║ ██║██║ ██║██████╔╝ ███╔╝
██║ ██║██║╚██╔╝██║ ╚██╔╝ ██║ ██║██║ ██║██╔══██╗ ███╔╝
██████╔╝██║ ╚═╝ ██║ ██║ ╚██████╔╝╚██████╔╝██║ ██║███████╗
╚═════╝ ╚═╝ ╚═╝ ╚═╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═╝╚══════╝
┌─[dmyourz@security]─[~/portfolio]
└──╼ $ cat mission.txt
[+] Government Compliance Specialist | Threat Hunter | Security Automation Expert
[+] 100% NIST 800-171 Compliance | 40% Vulnerability Reduction | 100+ Endpoints Secured
[+] "Defense in depth, automate everything, leave no system unpatched"
PS C:\Users\Daniel> whoami /all | Select-Object SecurityProfile
╔═══════════════════════════════════════════════════════════════════════╗
║ SECURITY ANALYST PROFILE ║
╚═══════════════════════════════════════════════════════════════════════╝
Name : Daniel Mochkarovsky
Role : Cyber Security Analyst I
Company : SurvTech
Location : Valrico, FL (Tampa Bay Area)
Clearance : Government Contractor Compliance Specialist
[CERTIFICATIONS]
├─ CompTIA Security+ (Certified)
├─ Cybersecurity Bootcamp (USF 2025)
└─ A.A. Computer Science (HCC 2020)
[SPECIALIZATIONS]
├─ NIST 800-171 & DFARS 252.204-7012 Compliance
├─ CMMC Level 2 & GCC Low Standards
├─ Vulnerability Assessment & Threat Hunting
└─ Security Automation & SIEM Operations
[IMPACT METRICS]
├─ 🎯 40% Reduction in Critical Vulnerabilities
├─ ✅ 100% Federal Compliance Achievement
├─ 🛡️ 100+ Endpoints/Servers Secured
├─ 📊 5 City Locations Audited
├─ 🔍 10+ Web Apps Deployed with Security Controls
└─ 📡 10+ Log Sources Integrated in SIEM
Philosophy : "Defense in depth, automate everything, leave no system unpatched"
Current Mission : Securing government contractor infrastructure | Solo Bitcoin mining on Pi5CompTIA Security+ certified cybersecurity specialist with proven track record of 100% compliance with NIST 800-171 and DFARS across government contracting environments. Achieved 40% reduction in critical vulnerabilities while managing 100+ endpoints/servers. Expert in security audits, vulnerability assessments, and enterprise security tool management across hybrid Azure and on-premise environments.
|
|
|
┌───────────────────────────────────────────────────────────────────┐
│ >> Initializing Security Project Portfolio... │
│ >> Loading comprehensive security implementations... │
│ >> Status: ████████████████████ 100% Complete │
└───────────────────────────────────────────────────────────────────┘
|
Comprehensive collection of cybersecurity projects, automation scripts, and security lab implementations demonstrating enterprise-grade security operations. 🎯 Project Highlights:
|
Advanced Android security research tool for GPS simulation with intuitive floating joystick controls, designed for penetration testing and security assessments. 🎯 Key Features:
|
|
🛡️ Vulnerability Assessment Lab [SYSTEMS SECURED]
├─ Wazuh SIEM Deployment
├─ 10+ Log Sources Integrated
├─ Real-time Threat Detection
└─ Automated Incident ResponseDeployed comprehensive security monitoring platform with Nessus integration, enabling continuous vulnerability assessment and automated remediation workflows. |
📊 Splunk Security Analytics [THREAT HUNTING ENABLED]
├─ Multi-Source Log Ingestion
├─ Custom Security Dashboards
├─ Automated Alert Rules
└─ Advanced Threat DetectionConfigured enterprise-grade log analysis system with custom visualizations and automated threat hunting capabilities for proactive security operations. |
🌐 Secure Web Application [IN DEVELOPMENT]
├─ Modern Security Controls
├─ Robust Authentication
├─ Defense-in-Depth Design
└─ Cutting-Edge SecurityCurrently developing personal web application implementing modern defensive security controls, secure architecture patterns, and comprehensive security testing. |
╔════════════════════════════════════════════════════════════════════════════╗
║ THREAT MITIGATION METRICS ║
╠════════════════════════════════════════════════════════════════════════════╣
║ ║
║ 🎯 Vulnerability Reduction ████████████████░░░░ 40% ↓ ║
║ ✅ Compliance Achievement ████████████████████ 100% ✓ ║
║ 🛡️ Endpoints Protected ████████████████░░░░ 100+ Systems ║
║ 📍 Locations Secured ████████░░░░░░░░░░░░ 5 Sites ║
║ 🌐 Applications Deployed ██████░░░░░░░░░░░░░░ 10+ Apps ║
║ 📡 SIEM Log Sources ██████░░░░░░░░░░░░░░ 10+ Sources ║
║ ║
║ ⚡ Time to Detect (MTTD) ████████████████████ <5 minutes ║
║ 🚀 Time to Respond (MTTR) ████████████████░░░░ <30 minutes ║
║ ║
╚════════════════════════════════════════════════════════════════════════════╝
|
Vulnerability Reduction |
Federal Standards Met |
Systems Protected |
Multi-Site Security |
Measurable Security Impact:
VulnerabilityReduction:
- Reduced critical vulnerability count by 40% through Nessus assessments
- Managed remediation for 100+ endpoints and servers
- Implemented automated vulnerability tracking and reporting
ComplianceExcellence:
- Achieved and maintained 100% NIST 800-171 compliance
- 100% DFARS 252.204-7012 compliance across all locations
- Led quarterly audits for CMMC Level 2 and GCC Low standards
- Multi-location government contractor infrastructure secured
EnterpriseDeployment:
- Managed 100+ endpoints/servers with Microsoft Intune and N-able RMM
- Deployed 10+ secure web applications with robust authentication
- Integrated 10+ log sources into Wazuh SIEM platform
- Secured hybrid Azure and on-premise environments
Technical Achievements:
SIEMOperations:
- Deployed full-scale Wazuh SIEM with real-time threat detection
- Built Splunk threat hunting system with custom dashboards
- Automated log analysis and threat detection rules
SecurityAutomation:
- Engineered automated Nmap reconnaissance scripts with NSE
- Created Python-based security assessment toolkit
- Reduced manual scanning time through automation
PersonalProjects:
- Successfully configured NerdMiner Bitcoin mining on Raspberry Pi 5
- Currently developing personal web app with cutting-edge security controls
Certifications & Education:
- CompTIA Security+ Certified
- Cybersecurity Bootcamp Graduate (USF, 2025)
- A.A. Computer Science (HCC, 2020)╔═══════════════════════════════════════════════════════════════════╗
║ ACTIVE SECURITY OPERATIONS ║
╚═══════════════════════════════════════════════════════════════════╝
[ACTIVE MISSIONS]
├─ 🛡️ Government Compliance
│ ├─ NIST 800-171 Implementation
│ ├─ DFARS & CMMC Level 2
│ └─ Multi-site Audit Leadership
│
├─ 🔍 Vulnerability Management
│ ├─ Nessus Security Assessments
│ ├─ Nmap Network Reconnaissance
│ └─ 40% Vulnerability Reduction
│
├─ 🤖 Security Automation
│ ├─ PowerShell Script Development
│ ├─ Python Security Tooling
│ └─ Automated Threat Detection
│
└─ 📊 SIEM Operations
├─ Wazuh Platform Management
├─ Splunk Log Analysis
└─ Real-time Threat Hunting |
[PERSONAL PROJECTS]
├─ 🌐 Secure Web Application
│ ├─ Modern Security Controls
│ ├─ Robust Authentication
│ └─ Defense-in-Depth Design
│
├─ ⛏️ Bitcoin Mining Research
│ ├─ Raspberry Pi 5 NerdMiner
│ ├─ Performance Optimization
│ └─ Remote Monitoring System
│
├─ 📚 Continuous Learning
│ ├─ Advanced Threat Hunting
│ ├─ Incident Response Tactics
│ └─ Cloud Security (Azure/AWS)
│
└─ 🔧 Tool Development
├─ Automation Scripts
├─ Security Utilities
└─ Assessment Frameworks |
┌─────────────────────────────────────────────────────────────────────┐
│ 💡 "The best defense is a good offense... and really good logging" │
└─────────────────────────────────────────────────────────────────────┘
┌─[EMPLOYMENT HISTORY]──────────────────────────────────────────────────┐
│ │
│ [CURRENT] Cyber Security Analyst I @ SurvTech │
│ └─ Tampa, FL | Feb 2025 – Present │
│ │
└────────────────────────────────────────────────────────────────────────┘🎯 Key Achievements:
- 40% Reduction: Decreased critical vulnerability count by 40% through systematic Nessus assessments and remediation management across 100+ endpoints/servers
- 100% Compliance: Achieved and maintained 100% compliance with NIST 800-171 and DFARS 252.204-7012 across multi-location government contracting infrastructure
- Quarterly Audits: Led security audits for 5 city locations, maintaining CMMC Level 2 and GCC Low standards
- Enterprise Security: Managed endpoint security with Microsoft Intune and N-able RMM across hybrid Azure/on-premise environments
- Network Security: Analyzed firewall configurations and network systems to ensure security baseline adherence
🛠️ Technical Responsibilities:
- Vulnerability assessment and risk management
- Security compliance auditing and reporting
- Endpoint security operations and incident response
- Security policy development and enforcement
┌─[PREVIOUS ROLES]──────────────────────────────────────────────────────┐
│ │
│ Web Designer / IT Specialist @ Independent Contractor │
│ └─ Tampa, FL | 2024 – 2025 │
│ │
└────────────────────────────────────────────────────────────────────────┘🎯 Key Achievements:
- 10+ Secure Applications: Designed and deployed 10+ secure web applications using HTML, CSS, and JavaScript
- Security Implementation: Built robust authentication systems, access controls, and proactive security monitoring
- Client Security: Provided comprehensive IT security consulting and support services
┌─[LEADERSHIP EXPERIENCE]───────────────────────────────────────────────┐
│ │
│ IT Director / Manager @ OTM Venture Capital Group │
│ └─ Tampa, FL | 2022 – 2024 │
│ │
└────────────────────────────────────────────────────────────────────────┘🎯 Key Achievements:
- IT Leadership: Led IT operations and security oversight for 15-person organization
- Policy Development: Developed and enforced security policies for user access, incident response, and system administration
- Windows Environment: Managed security for Windows infrastructure and system administration
╔═══════════════════════════════════════════════════════════════════════════╗
║ ║
║ "Security is not a product, but a process." - Bruce Schneier ║
║ ║
║ "The only truly secure system is one that is powered off, cast in a ║
║ block of concrete and sealed in a lead-lined room with armed guards." ║
║ - Gene Spafford ║
║ ║
║ "Defense in depth, automate everything, leave no system unpatched." ║
║ - DMYourz ║
║ ║
╚═══════════════════════════════════════════════════════════════════════════╝
┌─[dmyourz@security]─[~/contact]
└──╼ $ cat contact_info.txt
[+] Open to: Security Consulting | Collaboration | Knowledge Sharing
[+] Interests: Threat Hunting | Security Automation | Cloud Security
[+] Always: Learning | Building | Securing⭐ If you find my work valuable, star my repositories! 🤝 Open to collaborating on security projects and research 📧 Feel free to reach out for discussions on cybersecurity trends and best practices
_____ _ _ __
|_ _| |__ __ _ _ __ | | _____ / _| ___ _ __
| | | '_ \ / _` | '_ \| |/ / __|| |_ / _ \| '__|
| | | | | | (_| | | | | <\__ \| _| (_) | |
|_| |_| |_|\__,_|_| |_|_|\_\___/|_| \___/|_|
_ _ _ _
| | | |_| |_(_)_ __ __ _
| | | __| __| | '_ \ / _` |
| |___| |_| |_| | | | | (_| |
|_____|\__|\__|_|_| |_|\__, |
|___/
____ ____ _ _
/ ___| ___ ___ _ _ _ __ ___| _ \ ___ ___ ___ _ __ | |_ _ | |
\___ \ / _ \/ __| | | | '__/ _ \ | | |/ _ \/ __/ _ \ '_ \ | (_) (_)| |
___) | __/ (__| |_| | | | __/ |_| | (_) \__ \ __/ | | | | |_ _ |_|
|____/ \___|\___|\__,_|_| \___|____/ \___/|___/\___|_| |_| |_(_) (_)_(_)
Last Updated: 2025 | Built with: ❤️ and ☕ | Powered by: Endless curiosity