This list is always growing! I prioritize personal learning and career development. I am always actively pursuing materials to read, courses to take, and skills to master.
I have extensively experimented with SEIM tools, utilizing them for detection and configuring alerts. I have investigated and remediated security events and incidents using both CrowdStrike and Rapid7.
I am proficient in navigating EDR solutions. With EDR, I have conducted audits on user accounts to enforce a strong security posture. Additionally, I have configured, tested, and implemented firewall rules using EDR.
I have a well-rounded knowledge of cloud security tools. In practice, I have leveraged cloud-native tools to monitor users' role-based access, logins, email licenses, disabled/enabled status, authentication mechanisms, and to mandate sign-in blocks.
I am highly confident in working with phishing simulation tools. I have built numerous phishing email templates and launched 7 campaigns targeting approximately 3,000 users. I have a strong understanding of how to manipulate these tools to achieve desired outcomes.
I have worked with various cloud-native app control security solutions to investigate applications and domains, performing allow/block actions either locally or globally across the organization. In execution, I would use VirusTotal to investigate hashes, then check the documentation to see if the domain or application is needed or if another similar is in use, then I would use the app control solution to put the allow/block delegation in place.
I have experience working on helpdesk solutions, providing employees with kind, efficient, and accurate responses to technical issues. I have solved helpdesk tickets related to access issues, website access problems, file download difficulties, and trouble locating the PAB (phishing alert button).
I have extensive experience in Java, having completed five courses focused on it. At Lakes Community High School, I took two Java courses: Computer Science Principles and Computer Science A. At Loyola University, I furthered my knowledge with three college-level courses: Object-Oriented Programming, Data Structures I, and Data Structures II. During these courses, I enjoyed building games, creating data structures from scratch, and exploring new concepts year after year.
I possess a strong command of the Linux command line, which is my preferred environment. I have completed two dedicated courses: "Introduction to Computing Tool" at Loyola University and Google's "Tools of the Trade: Linux and SQL." I have extensively used Linux in various classes, as well as for personal projects and in cybersecurity competitions.
In practice, I have built various queries, mastered syntax, and analyzed logs. Notable projects included discovering plaintext passwords, tracking MFA logins, monitoring role changes, and managing ingress authentications. Additionally, I enhanced my SQL skills through coursework, particularly in Google's "Tools of the Trade: Linux and SQL" course.
I have been steadily gaining familiarity with Python by developing basic scripts and using them in cyber competitions. Currently, I am focusing on Python to establish a solid foundation for automation in my career. To achieve this goal, I am studying "Dead Simple Python" from No Starch Press.
I have minimal experience with C++, having briefly worked with the language during my Computer Systems course at Loyola University in 2023. Moving forward, I plan to deepen my understanding of C++ and also explore working with C# in the future.
I have practical experience managing active security events. I have successfully navigated a phishing attack, addressed a data breach involving company emails, and assisted in remediation from the CrowdStrike crash. I engaged with playbooks, collaborated with colleagues, and learned the necessary protocols to effectively respond to each incident.
During the spring 2024 semester, I completed a dedicated digital forensics course, producing a comprehensive 14-page forensic report with a timeline for a case study, earning 5 extra credit points and achieving a 106% grade. I also competed in a digital forensics CTF event, solving two cases by constructing event timelines and answering questions.
I worked extensively with cloud-native admin centers and the active directory to ensure employees were assigned appropriate roles and access to applications and sites. I developed log queries to monitor changes in user roles, ensuring accurate tracking of account access modifications.
In my Comp 301 course, I gained hands-on experience with hacking in controlled and legal environments. Building on this foundation, I have furthered my skills by participating in four (and counting) cyber hacking competitions.
As the cybersecurity landscape increasingly shifts towards the cloud, I have committed myself to staying ahead of the curve. I have completed a course focused on cloud security and have actively sought guidance from mentors in the field to learn best practices. I have practically applied these skills by utilizing various cloud-based security solutions such as Carbon Black, the Microsoft Admin Center, and Cisco Umbrella.
I prioritize good password management practices and have taken on the role of teaching and enforcing these skills. I conducted log searches to identify accounts with files containing "Password" in the title. I proactively engaged users, educating them on the risks involved and advising them on how to enhance their security measures.
Chicago, Illinois, United States
Chloe Kilroy
Copyright © 2024 Chloe Kilroy - All Rights Reserved.