Sarah M.
Details
Cyber Security
NYU Tandon School of Engineering
2021 : 2022
UI Design
UX/UI Design
Flatiron School
2019 : 2019
AAS
Fashion Design
Fashion Institute of Technology
2010 : 2011
Bachelor of Science, Business Administration; International Marketing
State University of New York at Buffalo - School of Management
2006 : 2010
University of Sydney
2009 : 2009
Compile publicly available information by researching on Linkedin, Hunter.io, theHarvester, dnsenum, IKE, NIKTO to assist with Social Engineering testing and future phishing attacks.
Provide accuracy when documenting reports on findings while providing screen grabs showcasing areas of improvement.
Utilizing our framework pulled together from NIST, HIPAA, FFIEC, NCU when performing remote and on-site risk and vulnerability analysis.
Prepare to perform on-site social engineering by conducting reconnaissance. Constructing a cover story, including designing logos, creating a backstory.
Perform Social Engineering to gain entry to restricted areas of financial institutions by using props like branded service provider polos and badges, and using charm.
2022 : Present
TraceSecurity
Information Security Analyst and Penetration Tester
Working as a Geek Squad Agent to solve the technical problems that plague our customers' devices. Including RATs, forgotten passwords, data backups and transfers, virus/malware scans and removals. Replacing, upgrading and repairing hard drives, RAM and graphics cards. Building and modifying custom computers, settings changes and upgrades, software upgrades and configurations
2021 : 2023
Geek Squad
Geek Squad Agent / Help Desk IT
2022 : 2022
RPM Raceway | Race Play More
IT Manager
Built Windows Server Virtual Machines (GUI and CLI)
Scope : Utilized virtualization software to create a virtual machine
Loaded operating system (Windows Server 2019), and performed setup; encrypt username and password
Ran tests, Set up the network. Pinged virtual machine to ensure a connection was established
Installation of WANs
Scope : Built Linux, and Wide Area Network (WAN) for a bank branch including three LANs
Identified ISP, designed layout for bandwidth, line quality, and hardware
Built WAN utilizing VPN
Utilized Cisco Packet Tracer 7.2.2.
Network Configuration
Scope : Set up a corporate network and implement security settings for a new bank branch
Devised network Topology plan and where to assign the IP address
Built VLANs, trunks, and routers to allow multiple stream communication. Arranged switches to communicate with port security and routers to work with OSPF
Configured network devices to prevent unauthorized access by securing privilege mode, encrypting passwords, and designing security messaging. Conducted successful connectivity test
Network Security
Scope : Acted as a security analyst to protect company communication
Set up 3 machines : client, host, and threat; established connection and engaged in communication through network requests and emails
Imitate a threat to extract info and intercept traffic-utilizing Wireshark
Configured firewall using pfSense
Python
Scope : Create code that receives input; a program that will accept user information
Create Python script(s) using Pycharm
Create input fields
Create a statement for the desired output
Test/Run to ensure correct output
Established protocols, secured channels in a sandbox environment, translated and encrypted code
Ethical Hacking
Scope : Use Wireshark to track passwords
Using Windows and Linux, lookup IP addresses. Try to crack passwords by monitoring the flow of traffic
(More in Education section)
2021 : 2022
NYU Tandon School of Engineering
Cyber Security Student
I sell jewelry and other items that I have made. The items are made by me, unique, edgy, and mostly vintage inspired
Design Jewelry
Market and advertise jewelry
Curate social media for jewelry Instagram
Build following on Instagram
Maintain social media following
Instagram : @sarahmelvi.designs
2011 : 2021
Sarahmelvi Jewelry
Owner of Sarahmelvi Jewelry
Skills
Access Control Management, Amazon Web Services (AWS), Cascading Style Sheets (CSS), Cloud Security, Communication, Cybersecurity, Debian, Ethical Hacking, Firewalls, Help Desk Support, HTML, Information Security, Jewelry Design, Kali Linux, Linux, Linux Server, Microsoft Azure, Microsoft Office, Microsoft Security, Network Administration, Networking, Nmap, Penetration Testing, Phishing, Prototyping, Python (Programming Language), Reconnaissance, Social Engineering, SQL Injection, Technical Support, Trend Analysis, Ubuntu, Virtualization, Vulnerability Assessment, Willingness to learn, Windows Server, Wireshark, Written Communication
About
I’m Sarah! I’m a former fashion designer with nearly a decade of design experience. I'm now a Cyber Security Analyst with hands-on experience in Windows, Network, Linux, Cloud Security, Ethical Hacking, Penetration Testing. Exceptional communication, problem-solving, and project management skills. Passionate for technology, working towards CompTIA Security+ and CompTIA Pentest+, CC certifications.
My goal is to gain valuable knowledge necessary to make me successful in the Cyber Security industry. I'm specifically interested in Penetration Testing, Ethical Hacking, Digital Forensics, and Insider Threat!
TECHNICAL SKILLS:
Technology: Wireshark, HoneyPot, Nessus, Pycharm, Help Desk, IT, OSI Model
Programming Languages: Python HTML/CSS
Operating Systems: Windows 10, Windows 16 Server, Kali Linux, Ubuntu, Debian, Redhat
Windows Security: Active Directory, Windows Server, Group Policy, DNS, Shares and Permissions, DHCP, Disk Management, Microsoft Endpoint Security, Security Policy, Microsoft Authentication, Powershell
Networking: Networking, Switch & IOS, IP & Routing, Subnetting, IPv4/6 Static Routing, Dynamic Routing, VLANs and Trunking, Diagnostics & Troubleshooting, Access Control List, Infrastructure Services
Cloud: AWS, Azure, Cloud Security, Virtualization and Container, and Advanced Cloud Security
Attacks: XSS, OWASP, Phishing, Social Engineering
Additional Relevant Experience: Microsoft Security, Computer Networking, Cloud Security, Linux Security, Network Security, Cyber Technologies, Python, Penetration Testing, Ethical Hacking, DFIR, Game Theory
Open to new opportunities!
Visit my website! Sarahmelvi.com
Email me at CyberSecSarah@gmail.com
Schedule a time to talk with me at calendly.com/CyberSecSarah
A short video interview with me and 1000 Hires:
https://res.cloudinary.com/project1000hires/video/upload/v1606336354/Sarah_Melville_4746dea198.mp4