Hi, I’m Daniel
In an era where digital threats loom large, the significance of cybersecurity skills cannot be overstated. Beyond my professional endeavors, I have set up a sophisticated home lab where I dive deep into the latest security techniques and strategies. I've built this hands-on lab to enhance my understanding of this dynamic field where I simulate cyber-attacks and defense strategies within an enterprise-like environment. This unyielding pursuit of knowledge empowers me to be an asset to any team looking to protect organizations against cyber threats.
My Resume
Over the years, I’ve accumulated a wealth of knowledge working in secure network environments, managing intricate IT systems, and applying best practices to safeguard sensitive data. With a solid academic foundation, holding a graduate degree in Technology from East Tennessee State University, backed by industry-recognized certifications, including CCNA for networking, AWS for cloud computing, CompTIA Security+ for cybersecurity, and the Data Center Certified Associate (DCCA) for specialized data center operations, I bring a wealth of expertise to the table.
My commitment to staying at the forefront of technology is evident in my hands-on experience gained from a sophisticated home lab – an immersive space where I delve deep into the latest technologies. This practical knowledge allows me to design, implement, and maintain robust IT infrastructures. My home lab isn’t just a side project; it mirrors my unwavering commitment to staying at the forefront of the ever-changing IT landscape.
I am enthusiastic about embracing new challenges and continuously seeking opportunities for professional growth in the ever-evolving IT landscape.
Master of Science
Technology
East Tennessee State University
I completed an advanced Technology degree at East Tennessee State University in Johnson City. Throughout this rigorous program, I delved into various technological domains. Dedication to my studies and active participation in hands-on experiences significantly enriched my understanding. This educational journey endowed me with a profound grasp of technology, equipping me with the tools to tackle intricate challenges in the ever-evolving tech landscape. My coursework encompassed a broad spectrum of subjects, including but not limited to:
• Investigative Technology: This course allowed me to explore in-depth methodologies for probing various technological aspects, honing my ability to unravel complex issues.
• Strategic Management of Technology & Innovation: This module gave me insights into strategically navigating the dynamic interplay between technology and innovation, fostering a comprehensive perspective on driving technological advancements.
• Operation & Tech Strategies: This course provided me with a comprehensive understanding of operational dynamics within the tech realm, enabling me to devise effective strategies to optimize processes and outcomes.
• Innovative Entrepreneurship: I delved into the realm of entrepreneurial endeavors within the tech sector, discovering avenues to channel innovation into practical, marketable solutions.
These educational pursuits elevated my technical proficiency and nurtured my critical thinking and problem-solving skills. I am now thoroughly prepared to excel in diverse roles across the tech industry, drawing upon the knowledge and skills I've acquired at East Tennessee State University.
https://www.etsu.edu/ehome/
Certification
AWS Certified Cloud Practitioner
Having obtained the AWS Certified Cloud Practitioner credential, I have garnered acknowledgment for my comprehensive understanding of fundamental cloud computing principles and proficiency in utilizing various AWS services. This certification is a testament to my capacity to navigate the intricate terrain of cloud technology. Moreover, it establishes a solid groundwork for pursuing more advanced AWS certifications. View my verified certificate https://www.credly.com/badges/d27c0b2b-cba9-47c1-88b7-a5b8968a8a08/public_url
Cisco Certified Network Associate (CCNA)
Securing the Cisco Certified Network Associate (CCNA) certification is a testament to my profound aptitude in networking fundamentals. Within this achievement lies a comprehensive grasp of critical concepts, reflecting my competence in routing, switching, and fundamental network security. This certification underscores my capacity to meticulously design intricate network architectures and implement cohesive solutions that facilitate seamless data flow and communication.
My command over routing and switching protocols empowers me to optimize data transmission, ensuring that information navigates networks efficiently and precisely. My sound understanding of basic network security principles also equips me to institute safeguards that shield networks from potential threats and vulnerabilities. This certification showcases my ability to orchestrate the dynamic interplay of hardware and software components, ultimately culminating in resilient and reliable network infrastructures.
The CCNA certification validates my knowledge and bolsters my confidence in constructing and maintaining networks that meet industry standards. Armed with this credential, I am primed to contribute effectively to projects that demand a deep understanding of networking intricacies while paving the way for further specialization and advancement within the dynamic landscape of network technology. View my verified certificate
https://www.credly.com/badges/5d540a08-79c8-4df1-a45d-619e2fa97c8a/public_url
Security+
Having successfully acquired the CompTIA Security+ certification, I have fortified my knowledge in the realm of cybersecurity essentials. This credential serves as a concrete demonstration of my proficiency in safeguarding critical components of the digital landscape. Through a comprehensive examination of security protocols and practices, I've honed my ability to fortify systems, networks, and data against a myriad of potential threats.
My grasp of cybersecurity principles enables me to identify vulnerabilities and devise strategic solutions to mitigate risks proactively. From implementing robust access controls to developing resilient encryption strategies, I've cultivated an indispensable skill set in ensuring sensitive information's confidentiality, integrity, and availability. With the CompTIA Security+ certification, I'm equipped to champion the cause of cybersecurity and adeptly navigate the complex terrain of modern digital security challenges.
This certification is a testament to my expertise and underscores my unwavering dedication to upholding secure digital environments. Armed with the CompTIA Security+ credential, I'm poised to contribute significantly to the defense against cyber threats, fortifying organizations against the ever-evolving landscape of malicious activities. This accomplishment solidifies my commitment to continuous learning and places me in a position to make impactful contributions to the broader realm of cybersecurity. View my verified certificate
https://www.credly.com/badges/873bc6db-36be-4207-a646-851fd6ecdacc/public_url
Data Center Technician
Cologix, Inc. Columbus, OH
In my role as a Data Center Technician, I am entrusted with the integral responsibility of overseeing the daily operations and maintenance of a Multi-tenant Data Center environment. This involves various pivotal tasks, from configuring and installing network equipment to managing cross-connects and monitoring critical infrastructure components, utilizing advance monitoring system.
An important part of my job is to promptly address and resolve customer support inquiries. These requests span from routine server reboots to intricate troubleshooting of network equipment and replacing critical components. I execute remote hands requests and ensure optimal performance and reliability of the Data Center through monitoring, identifying potential anomalies, analyzing, and swiftly responding to emergent issues.
At the completion of each task, I update the order management system, ensuring accurate records, and streamlined processes. My active participation in on-call rotations ensure that I am available 24/7 to provide swift support during Data Center emergencies, ensuring exceptional support for clients and customers.
https://cologix.com/
Network Installation Technician
Bresco Broadband. Columbus, OH
As a Network Installation Technician, I undertook a diverse array of responsibilities to ensure the seamless functioning of the network infrastructure. This included configuring and installing an array of network equipment, ranging from servers to routers, access points, switches, firewalls, and security cameras. I was integral in installing cabling infrastructure and network equipment within the Data Center, utilizing best cable management practices to ensure a streamlined and organized setup.
My duties also included fusion splicing, termination, and thorough testing of fiber optic cables, ensuring high-quality and reliable connections.
I collaborated with cross-functional teams to seamlessly perform network upgrades and expansions while minimizing service disruptions. Troubleshooting network issues, delving deep into identifying root causes, and promptly implementing effective solutions were important parts of my job responsibilities.
I documented all network installations, repairs, and troubleshooting activities, maintaining a comprehensive record keeping system.
https://www.brescobroadband.com/
IT Oficer (volunteer)
The River of Life Global Ministries
As the lead IT person for The River of Life Global Ministries, I have assumed a pivotal role in establishing and developing the ministry's IT infrastructure. Spearheading the planning and implementation of this endeavor, I have transformed an initially non-existent IT system into a dynamic and evolving framework. This ongoing initiative is driven by a commitment to catering to the ministry's evolving needs, ensuring a seamless alignment between technological solutions and the organization's mission.
Functioning as the foremost IT authority, I provide instrumental technical leadership across a spectrum of IT project-related activities. My expertise in information technology systems and services is harnessed to guide the team toward optimal outcomes. My responsibilities extend to overseeing and orchestrating the execution of IT operations, projects, and programs.
Integral to my role is coordinating IT acquisitions, including hardware, software, and services.
This strategic role involves detailed planning to ensure the solutions deployed are practical and tailored to the ministry's requirements. My involvement in this aspect is supplemented by active participation in crafting short- and long-term IT solutions. My insights and recommendations feed into the planning, development, and implementation of strategies that fortify the ministry's technological prowess, fostering a harmonious integration of IT capabilities and ministry goals.
https://theriveroflifeministries.org/
My Home Lab
simulating cyber attacks and defense
Introduction: In an age overshadowed by digital vulnerabilities, the importance of cybersecurity skills cannot be emphasized enough. I have built this hands-on cybersecurity home lab to enhance my understanding of this dynamic field. I’m utilizing this lab to simulate cyber-attacks and defense strategies within an enterprise-like environment.
Purpose and Scope: In this write-up, I’ll share my goals and aspirations for creating this cybersecurity lab. My primary objective in establishing this lab is to harness a hands-on approach that allows me to simulate real-world cyber threats and test defense mechanisms. By outlining the components and technologies I’ve chosen, I’ll provide insight into the scope of my lab’s capabilities.
LAB COMPONENTS
VMware Hypervisor: The cornerstone of my lab’s architecture is the VMware hypervisor—a dynamic software layer that enables me to create, manage, and orchestrate multiple virtual machines (VMs) within a single physical host. In this virtualized infrastructure, I’ll walk you through the intricacies of my network setup and briefly explain each virtual machine’s role in my lab ecosystem.
Windows Server 2019: The Windows Server 2019 VM assumes the role of an Active Directory domain controller. Within this virtual server, I’ve configured user accounts, created organizational units, and implemented strategic group policies—mirroring the complex dynamics of real-world Active Directory environments. Additionally, I’ve integrated a Splunk universal forwarder to ensure the seamless forwarding of log data to the main Splunk software installed on the Ubuntu server.
Pfsense Firewall: Acting as the defender of my lab’s digital perimeters, the Pfsense firewall is configured with advanced firewall rules, integrated NAT and VPN functionalities, and enhanced security with intrusion detection mechanisms.
Splunk installed on Ubuntu server: Splunk is a powerful log analysis platform. Its function in this lab is to centralize log data from various sources for streamlined monitoring and analysis.
Kali Linux: Emulating the mindset of cyber attackers, the Kali Linux VM transforms my lab into an environment for ethical hacking. Armed with the resources of penetration testing tools, I venture into various attack vectors, dissecting their intricacies and arming myself with insights that fortify my defenses.
Security Onion: This virtual machine (VM) serves as a network intrusion detection system (NIDS). Its function in the lab is to oversee network traffic, detect possible security breaches, and enhance my understanding of intrusion detection capabilities.
Metasploitable2: In the realm of vulnerability testing, the Metasploitable2 Server assumes center stage. I utilize its potential to unveil vulnerabilities, exploit weaknesses, and expose the techniques that adversaries might deploy against compromised systems.
Windows 11 Desktop: The Windows 11 Desktop VM is the conduit for network access, performing management tasks, and interactive engagement with my lab.
ATTACK AND DEFENSE MECHANISMS
Brute Force Attack: Within the confines of my lab, I undertake a simulated breach of an Active Directory environment through a brute force attack. The results shape my proactive stance on account lockout policies and other security measures.
Malware Infection: By orchestrating the simulated introduction of malware, I analyze the degrees of infections and deploy endpoint protection and response strategies, increasing my preparedness for real-world scenarios.
Web Application Vulnerability: This simulated attack is used to identify web application vulnerabilities and exploitation.
Phishing Attack: I simulate a phishing attack to analyze user responses, implement email security best practices, and gain a deeper understanding of the potential impact of successful phishing campaigns.
Network Intrusion Detection: Leveraging Splunk and Security Onion, I simulate real-time network intrusion detection by monitoring and analyzing network traffic, detecting potential threats, and refining strategies to respond to suspicious activities.
CONCLUSION
Every scenario in this lab teaches many lessons—lessons that transcend the virtual realm and resonate with the tangible implications of real-world cybersecurity. As I navigate the intricacies of my lab, I’m reminded of the unceasing journey of learning, adaptation, and staying attuned to the ever-evolving world of cyber threats.
My cybersecurity home lab captures the spirit of experiential learning and proactive preparedness. Within its virtual environment, I am empowered to tackle various challenges, decode the workings of attack methodologies, and construct a resolute defense. As I navigate this ever-changing landscape, I’m reminded that the digital world is a domain of continuous evolution, requiring unwavering watchfulness and an unquenchable thirst for knowledge.
Note: In every endeavor within this lab, I steadfastly uphold the principles of ethical conduct and adherence to legal guidelines, fostering a safe and responsible learning environment.
My Blog
Navigating the Cloud: My Journey as an AWS Certified Cloud Practitioner
In today’s tech-driven world, cloud computing has become an indispensable part of our digital landscape. As businesses and individuals alike transition to cloud-based solutions, understanding the fundamentals of cloud computing has never been more crucial. This is where my journey as an AWS Certified Cloud Practitioner began—a journey of exploration, learning, and skill-building that has allowed me to navigate the intricate realm of cloud technology with confidence.
Getting Acquainted with Cloud Computing: My journey started with the decision to pursue the AWS Certified Cloud Practitioner certification. This certification serves as a solid introduction to the world of cloud computing, covering essential concepts, services, and best practices offered by Amazon Web Services (AWS). With an unwavering curiosity and a determination to excel in this dynamic field, I embarked on a path that would lead me to a profound understanding of cloud essentials.
Mastering Cloud Concepts and AWS Services: The certification journey was marked by an immersive study of cloud concepts that underpin the technology. I dived into the world of scalability, elasticity, and the shared responsibility model, concepts that are the cornerstones of cloud computing. Understanding how AWS services like EC2, S3, and RDS work together to deliver seamless solutions was a fascinating revelation. The versatility of cloud services became evident as I explored storage, compute, and database offerings, each designed to empower businesses with flexibility and efficiency.
Hands-On Learning and Real-World Applications: While theory laid the foundation, hands-on experience truly solidified my grasp of the subject matter. Through labs, projects, and practical exercises, I had the opportunity to interact with AWS services firsthand. Deploying virtual machines, setting up storage solutions, and configuring networking components brought the theoretical concepts to life, bridging the gap between knowledge and application.
Growth and Professional Impact: Becoming an AWS Certified Cloud Practitioner marked not just the culmination of knowledge but the beginning of a new chapter. Armed with this certification, I’ve gained a competitive edge in a technology-driven job market. The ability to converse fluently about cloud computing, comprehend its advantages, and contribute to cloud-based solutions has opened doors to exciting career prospects and meaningful contributions to businesses harnessing the cloud’s potential.
Final Thoughts: As I reflect on my journey as an AWS Certified Cloud Practitioner, I’m reminded of the vastness of the cloud landscape and the constant evolution it undergoes. From a comprehensive understanding of cloud principles to the practical implementation of AWS services, this certification has equipped me to navigate the cloud confidently. The journey continues as I explore more advanced AWS certifications, propelled by the foundational knowledge gained on this remarkable voyage.
In this era of digital transformation, the cloud is the canvas upon which innovative solutions are painted. As an AWS Certified Cloud Practitioner, I am ready to take on the challenges and opportunities that lie ahead, using cloud technology to shape the digital world in ways that were once only imagined.
Networking Know-How: Unveiling the Power of a CCNA Certification
In a world fueled by connectivity, the backbone of our digital interactions is formed by intricate networks. From sharing information to conducting business, networking is the lifeline of our modern age. My journey as a Cisco Certified Network Associate (CCNA) has been a voyage of discovery, revealing the immense power and potential that comes with mastering the art of network management and security.
Embarking on the CCNA Expedition: My journey began with a commitment to enhance my networking expertise. The Cisco Certified Network Associate (CCNA) certification was the perfect stepping stone—a comprehensive program that covers routing, switching, and network security fundamentals. With a thirst for knowledge and a drive to excel, I set forth on a path that would lead me to a deeper understanding of the intricate world of networks.
Unlocking the Secrets of Networking: The CCNA certification journey took me on a guided tour of the intricacies of network design, configuration, and troubleshooting. I delved into the protocols that facilitate seamless data transmission, learned to configure routers and switches to optimize network performance, and explored techniques to secure network infrastructure against potential threats. With each concept mastered, I uncovered a new layer of networking’s complexity and its role in keeping our digital world connected.
Hands-On Exploration and Practical Mastery: While theory laid the foundation, hands-on experience provided the invaluable bridge between knowledge and application. Engaging in labs and real-world scenarios, I had the privilege of configuring network devices, identifying and resolving issues, and implementing security measures firsthand. This practical exposure not only solidified my understanding but also equipped me to handle real-world network challenges confidently.
Elevating Professional Trajectory: Becoming a Cisco Certified Network Associate has elevated my professional trajectory in remarkable ways. Armed with this certification, I possess the skills and knowledge to design, implement, and manage networks effectively. Whether it’s optimizing data flow, ensuring network reliability, or fortifying against cyber threats, I’m equipped to contribute meaningfully to the network-centric demands of today’s technology landscape.
Continuing the Network Odyssey: As I continue to traverse the ever-evolving landscape of networking, I’m excited by the possibilities that lie ahead. The CCNA certification has provided me with a solid foundation, and I’m eager to explore more advanced networking concepts and certifications that will further enhance my skills and expertise.
In a world that thrives on connections, the CCNA certification has empowered me to shape and secure the digital highways that keep us linked. From small-scale networks to global infrastructures, I’m ready to navigate the complexities, embrace the challenges, and continue to unveil the true power of networking know-how.
Guardians of the Digital Realm: Embracing Cybersecurity with CompTIA Security+
In an age where digital landscapes are both our playground and our battlefield, cybersecurity stands as the sentinel that safeguards our virtual existence. My journey into the realm of cybersecurity began with the pursuit of the CompTIA Security+ certification—a path that has illuminated the vital role of safeguarding systems, networks, and data in a world increasingly vulnerable to cyber threats.
Embarking on the Cybersecurity Odyssey: My journey began with a deep fascination for cybersecurity—an arena where technology and vigilance converge to protect against an ever-evolving array of digital dangers. Pursuing the CompTIA Security+ certification was a deliberate step into this world of digital guardianship. Through comprehensive study and hands-on exploration, I delved into the multifaceted world of cybersecurity, uncovering layers of knowledge that transcend the digital boundaries.
An Armor of Knowledge: The CompTIA Security+ certification proved to be a rich tapestry of cybersecurity essentials. From understanding cryptography and encryption techniques to dissecting network vulnerabilities and penetration testing, each component of the certification unraveled critical aspects of securing digital assets. Armed with this knowledge, I’m better equipped to anticipate, mitigate, and respond to cybersecurity threats that lurk within the digital realm.
Defending with Practical Expertise: Theory alone is insufficient in the world of cybersecurity. The practical dimension of the CompTIA Security+ certification proved invaluable as I navigated simulations, exercises, and hands-on scenarios. This hands-on experience equipped me to fortify systems against potential attacks, configure secure networks, and implement protective measures that extend beyond theoretical understanding.
Empowered for a Cyber-Resilient Future: With the CompTIA Security+ certification as my shield, I’m prepared to take on the challenges of a cyber-resilient future. From safeguarding personal data to fortifying organizational networks, my expertise spans a spectrum of cybersecurity disciplines. I’m committed to contributing to a digital world where security and innovation walk hand in hand.
Continuing the Cybersecurity Expedition: My journey into cybersecurity doesn’t end with the CompTIA Security+ certification. It’s a continuous expedition marked by ongoing learning and adaptation. As threats evolve, so must our defenses. With the foundation laid by this certification, I’m poised to explore advanced cybersecurity domains, leveraging my knowledge to stay ahead of threats and maintain the integrity of the digital realm.
In a landscape where data breaches and cyberattacks loom large, the CompTIA Security+ certification has empowered me to stand as a guardian of the digital realm. Armed with knowledge, equipped with practical skills, and committed to the cause, I’m prepared to uphold the principles of cybersecurity and contribute to a safer, more secure digital future.
Let's Connect
Have questions, ideas, or opportunities you'd like to discuss? Let's start a conversation and explore the possibilities together.
Phone: (423) 617-9714 Email: it@danielmulbah.com