Skip to content

PDB65/Burwell_P

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

89 Commits
 
 
 
 
 
 

Repository files navigation

🛡️Pamela Burwell - My Cybersecurity Project Portfolio

With a strong passion for cybersecurity, I focus on addressing complex security challenges through practical, hands-on projects. My experience spans areas such as vulnerability management and threat detection. Allowing me to stay at the forefront of evolving cyber threats. Explore my projects to see how I have enhanced security workflows and implemented effective risk mitigation strategies!


Platforms and Technology Used Within the Projects:

  • Tenable.io
  • SIEM (Microsoft Sentinel),
  • EDR (MS Defender for Endpoint)
  • Azure VMs
  • KQL (Kusto Query Language)
  • PowerShell

⚠️ Vulnerability Management Projects

Vulnerabilities and Patching: Internal scans and external scans can be conducted to fine the vulnerabilities that need patching.


Enhance your organization's security posture for Windows 10 systems.


🔍 Threat Hunting and Security Operations

Proactive Cybersecurity Defense

Know_The_Threats


🔑 NIST Framework

  • The NIST Cybersecurity Framework (CSF) is a set of voluntary guidelines developed by the (NIST) National Institute of Standards and Technology.
  • The NIST helps organizations manage and reduce cybersecurity risks!
  • Click the link to view NIST 800-53 and other NIST Publications!

🚨 Common Vulnerabilities and Exposures

CVEs (short for Common Vulnerabilities and Exposures) are standardized identifiers for publicly known cybersecurity vulnerabilities. The CVE system is overseen by the organization MITRE Corporation. The system is under the sponsorship of the U.S. government (specifically CISA). CVEs vary widely and some are critical (like remote code execution), others are low-risk. CVE IDs are unique identifiers assigned to specific vulnerabilities.


🔧 SIEM (Security Information Event Management)

  • A SIEM system not only collects logs from various sources in real-time but also enables event correlation, log searching, incident investigation, and swift response.

🗣️ Discussing Cybersecurity

Two security experts sit down for a chat and leave you with a better understanding of cybersecurity!"


🌐 Connect With Me

Pam Burwell | LinkedIn YouTube

About

Burwell - Cybersecurity Portfolio

Resources

Stars

Watchers

Forks

Contributors