• Home
  • About Me
  • Skills
  • Projects
  • Experience
  • Achievements
  • Upcoming Events
  • Blog
  • More
    • Home
    • About Me
    • Skills
    • Projects
    • Experience
    • Achievements
    • Upcoming Events
    • Blog
  • Home
  • About Me
  • Skills
  • Projects
  • Experience
  • Achievements
  • Upcoming Events
  • Blog

Skills

I Always keep learning!

This list is always growing! I prioritize personal learning and career development. I am always actively pursuing materials to read, courses to take, and skills to master.

View My Achievements

Cyber Skillset

Tools

SEIM

I have extensively experimented with SEIM tools, utilizing them for detection and configuring alerts. I have investigated and remediated security events and incidents using both CrowdStrike and Rapid7.

EDR Solutions

I am proficient in navigating EDR solutions. With EDR, I have conducted audits on user accounts to enforce a strong security posture. Additionally, I have configured, tested, and implemented firewall rules using EDR.

Cloud Security Services

I have a well-rounded knowledge of cloud security tools. In practice, I have leveraged cloud-native tools to monitor users' role-based access, logins, email licenses, disabled/enabled status, authentication mechanisms, and to mandate sign-in blocks.

Phishing Simulation

I am highly confident in working with phishing simulation tools. I have built numerous phishing email templates and launched 7 campaigns targeting approximately 3,000 users. I have a strong understanding of how to manipulate these tools to achieve desired outcomes.

App Control

I have worked with various cloud-native app control security solutions to investigate applications and domains, performing allow/block actions either locally or globally across the organization. In execution, I would use VirusTotal to investigate hashes, then check the documentation to see if the domain or application is needed or if another similar is in use, then I would use the app control solution to put the allow/block delegation in place.

Helpdesk

I have experience working on helpdesk solutions, providing employees with kind, efficient, and accurate responses to technical issues. I have solved helpdesk tickets related to access issues, website access problems, file download difficulties, and trouble locating the PAB (phishing alert button).


Programming Knowledge

Java

I have extensive experience in Java, having completed five courses focused on it. At Lakes Community High School, I took two Java courses: Computer Science Principles and Computer Science A. At Loyola University, I furthered my knowledge with three college-level courses: Object-Oriented Programming, Data Structures I, and Data Structures II. During these courses, I enjoyed building games, creating data structures from scratch, and exploring new concepts year after year.

Linux

I possess a strong command of the Linux command line, which is my preferred environment. I have completed two dedicated courses: "Introduction to Computing Tool" at Loyola University and Google's "Tools of the Trade: Linux and SQL." I have extensively used Linux in various classes, as well as for personal projects and in cybersecurity competitions.

SQL

In practice, I have built various queries, mastered syntax, and analyzed logs. Notable projects included discovering plaintext passwords, tracking MFA logins, monitoring role changes, and managing ingress authentications. Additionally, I enhanced my SQL skills through coursework, particularly in Google's "Tools of the Trade: Linux and SQL" course.

Python

I have been steadily gaining familiarity with Python by developing basic scripts and using them in cyber competitions. Currently, I am focusing on Python to establish a solid foundation for automation in my career. To achieve this goal, I am studying "Dead Simple Python" from No Starch Press.

C++

I have minimal experience with C++, having briefly worked with the language during my Computer Systems course at Loyola University in 2023. Moving forward, I plan to deepen my understanding of C++ and also explore working with C# in the future.


Core Concepts

Incident Response

I have practical experience managing active security events. I have successfully navigated a phishing attack, addressed a data breach involving company emails, and assisted in remediation from the CrowdStrike crash. I engaged with playbooks, collaborated with colleagues, and learned the necessary protocols to effectively respond to each incident.

Digital Forensics

During the spring 2024 semester, I completed a dedicated digital forensics course, producing a comprehensive 14-page forensic report with a timeline for a case study, earning 5 extra credit points and achieving a 106% grade. I also competed in a digital forensics CTF event, solving two cases by constructing event timelines and answering questions.

Access Control

I worked extensively with cloud-native admin centers and the active directory to ensure employees were assigned appropriate roles and access to applications and sites. I developed log queries to monitor changes in user roles, ensuring accurate tracking of account access modifications.

Ethical Hacking

In my Comp 301 course, I gained hands-on experience with hacking in controlled and legal environments. Building on this foundation, I have furthered my skills by participating in four (and counting) cyber hacking competitions.

Cloud Security

As the cybersecurity landscape increasingly shifts towards the cloud, I have committed myself to staying ahead of the curve. I have completed a course focused on cloud security and have actively sought guidance from mentors in the field to learn best practices. I have practically applied these skills by utilizing various cloud-based security solutions such as Carbon Black, the Microsoft Admin Center, and Cisco Umbrella.

Password Management

I prioritize good password management practices and have taken on the role of teaching and enforcing these skills. I conducted log searches to identify accounts with files containing "Password" in the title. I proactively engaged users, educating them on the risks involved and advising them on how to enhance their security measures.

Contact Me

Chloe Kilroy

Email: 

chloe-kilroy@outlook.com


LinkedIn: 

www.linkedin.com/in/chloe-kilroy

Chicago, Illinois, United States

Chloe Kilroy

Copyright © 2025 Chloe Kilroy - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept