Skip to content
View TheCyberLeader's full-sized avatar
  • New Jersey, USA

Block or report TheCyberLeader

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
TheCyberLeader/README.md
Banner

πŸ’« About Me

Born to immigrant parents and raised in Metro Detroit, Michigan, I learned resilience early through financial hardship and community change. Those formative experiences taught me imagination and determination, qualities that continue to guide my work today.

With over 11 years as a cybersecurity and governance executive, I've built my career on a simple belief: security should accelerate business, not slow it down. My work focuses on translating complex regulations into frameworks that enable transformation, building teams that drive results, and ensuring organizations can innovate with confidence.

My advocacy for women in cybersecurity reflects a core commitment that leadership means creating pathways for others, powered by people and focused on lasting impact across industries.


πŸš€ Featured Work

A hands-on showcase developed as part of the WiCyS / Google Cybersecurity Certificate Program, presented through the lens of a governance- and risk-aware cybersecurity leader.

  • Security Audits & Compliance: NIST-based security audits, risk assessments, and compliance mapping
  • Incident Response: Multi-scenario threat analysis including DNS failures, DoS attacks, brute force attempts, ransomware, and phishing incidents
  • Technical Security Operations: Linux/SQL security operations, file permissions management, database query filtering, and security investigations
  • Risk & Vulnerability Management: Threat modeling using PASTA Framework, NIST SP 800-30 risk quantification, and access control design
  • Security Automation: Python-based automation for security tasks including log parsing, pattern matching, and security algorithm development
  • SOC Analyst Workflows: Alert triage, log analysis, and threat intelligence integration using NIST IR Lifecycle

πŸ“Š Portfolio Analytics Dashboard

Project Metrics

Projects Scripts Frameworks Documentation

πŸ’» Tech Stack

Security & Compliance Frameworks

NIST ISO 27001 GDPR HIPAA SOC2 CMMC

Cloud & Infrastructure

AWS Linux

Programming & Scripting

Python Bash SQL

Security Tools & Analysis

Wireshark Splunk MITRE ATT&CK

Development & Collaboration

GitHub Git

Design & Documentation

Canva Adobe Creative Suite


🌐 Connect

Email


Pinned Loading

  1. TheCyberLeader TheCyberLeader Public