<aside> 🔑 Cybersecurity professional in Charleston, SC — passionate about information.
</aside>
<aside> <img src="https://theme.zdassets.com/theme_assets/841909/92950fb3c1be711b8debb7b89412cb17a5d95f0c.png" alt="https://theme.zdassets.com/theme_assets/841909/92950fb3c1be711b8debb7b89412cb17a5d95f0c.png" width="40px" /> T. +1 773 318 6210
</aside>
<aside>
<img src="https://pbs.twimg.com/profile_images/532192252404051968/bY9xvakE.png" alt="https://pbs.twimg.com/profile_images/532192252404051968/bY9xvakE.png" width="40px" /> gpg --keyserver keys.openpgp.org --recv-key 6284D262BD31CD4A8B5C99C81509C461528F0317
</aside>
<aside> 📧 E. [email protected]
</aside>
Bachelor of Science in Information Science & Cognitive Psychology
Just received my Bachelor of Science from Northeastern University
Department of Informatics — Study Abroad
Certified Information Systems Security Professional (CISSP) was issued by (ISC)² to Ian Leonard.
Certified Data Privacy Solutions Engineerâ„¢ (CDPSEâ„¢) was issued by ISACA to Ian Leonard.
Microsoft Certified: Azure Security Engineer Associate was issued by Microsoft to Ian Leonard.
<aside> 🔑 Proficient | Comfortable
</aside>
Web Application Attacks (SQLi, XSS, File Inclusion, Path Traversal) & Remediation | Buffer Overflows (Windows, Linux) | Privilege Escalation | Password Attacks | Vulnerability Scanning | Port Scanning | Service Enumeration
SD Elements | Veracode (SAST, SCA) | Twistlock | Metasploit | Burp Suite | Kali Linux Suite | Anaconda & Jupyter | Jenkins & CircleCI | VMware
Open Source Software Policy | Application Development Policy | Vulnerability Disclosure Policy
Python (including Pandas, NumPy) | Bash | Java
Azure | AWS | Kubernetes | MacOS | Kali | Debian
<aside> 💡 Use the arrows to expand each section
</aside>
2022 - Present
Technology and Digital Advantage (TDA)