cv

Basic information about me, things like education, intrests projects etc.

Basics

Name Alexander Graham
Label Information Technology Security
Email [email protected]
Url https://assdcii.github.io
Summary An Australian Cyber Security student.

Work

  • 8/2023 - 7/2024
    Team Member
    Woolworths Supermarkets
    My key responsibilities were to be at the front of the store working the checkout or supervising the self-checkout area assisting customers with questions and processing of orders. I also took the opportunity to assist other departments when short-staffed restocking shelves, rotating and replenishing cold stock items.

Education

Awards

  • 7/11/2024
    Top 5 Regionals Cyber Security
    WorldSkills Australia
    Placed in the top 5 among 80 other competitors and qualified for the Nationals being held in Brisbane June 2025. This competition had us find flags in challenged ranging from Software cracking, Web Exploitation, SEIM Incident response, scripting and 'Real World Scenarios'

Skills

Cyber Security
Information Security
Penetration Testing
Incident Response
Legal & Ethical Compliance
Data Privacy
Data Analysis
IoT Security
Advanced Terminal use
Linux
Security Information and Event Management (SIEM)
Networking
Common Networking Protocols
OSI & TCP/IP
Cisco IOS & Networking
Network Security
Network Infrastructure
Network Design
Cloud Technology
IoT Networking
IT
PC & Server Hardware
Desktop & Server Software
Windows 10, 11 & Server editions
Troubleshooting
Data Analysis
IoT Devices
Python Programming
Utilising API's in Scripting & Automation
Soft Skills
Customer Service
Team Collaboration & Communication
Problem Solving
Critical and Analytical thinking
Adaptable
Always willing to learn

Interests

IT Systems
Windows, Linux and MacOS Customisation & Installation
PC Hardware
Rasberry Pi
Virtual Machines running various OS
Programming and Scripting (mostly in Python but some C & Bash)
Hobbies
Ice Skating
Gym
Photography

Projects

  • 29/1/25 - 7/2/25
    Microsoft Azure Windows 10 RDP Honeypot for Brute-forcers
    On the Azure cloud I set up a Windows 10 instance and gave it a Public IP address and enabled the RDP port to allow for random people anywhere in the world to attempt to brute force their way into it and collected the failed attemps logs using the Logs and Analytics app in Azure and set up Microsofts SEIM called Sentinal to read logs and create incidents when it found a attempt or unauthorised login.
    • Azure Cloud Experience
    • Statistics on how Attackers brute force systems
    • Structered Query Language (KQL)
    • Industry Security Standards
  • HackTheBox Academy
    One of the places I go to learn new skills and hands-on experience about Information Technology, Networking and Cybersecurity. HackTheBox Academy
    • Information Technology
    • Pennetration Testing skills
    • SOC Analyst skills
    • Programming
    • Advanced Linux use