Eldon Gabriel

Security Systems Administrator

Secure Infrastructure | System Hardening | GRC → Enforced Controls

Security Control Implementation Portfolio

I implement practical security controls that harden enterprise systems, investigate operational issues, and reduce organizational risk. As an ISC² Certified Cybersecurity Professional (CC) with 100+ documented technical labs and reports, my work focuses on securing real IT environments through repeatable system administration and defensive security practices.

My portfolio follows a Proof of Work methodology, where each security concept is validated through hands-on implementation and documented technical analysis. Projects include system hardening, network security configuration, incident troubleshooting, and infrastructure protection aligned with industry security frameworks.

The goal is simple: convert security theory into measurable, defensible controls that operate effectively in real-world environments.

This portfolio is continuously updated with new labs, projects, and troubleshooting scenarios. It serves as a working reference of applied security practices, covering both implementation and problem resolution across systems, networks, and security operations.

Security Engineering & Control Enforcement

System Hardening & Control Enforcement

  • CIS benchmark policies
  • Least privilege enforcement
  • Registry hardening
  • Group policy controls
  • IP access restrictions

Network Security & Defense

  • Firewall rule enforcement
  • pfSense configuration
  • IPsec VPN troubleshooting
  • DNS traffic analysis
  • Misconfiguration identification
  • Access control validation

GRC Implementation & Operational Resilience

  • NIST aligned controls
  • Risk register mapping
  • Policy enforcement
  • Technical safeguard implementation
  • Post breach remediation
  • Audit readiness maintenance

Explore My Certifications


Foundational Mentorship

George H. Ross
George H. Ross
NBC’s ‘The Apprentice’ Judge & Mentor

Instilled a disciplined evaluation of risks and thorough investigative practices essential for proactive threat hunting and forensic accuracy.

Wahida Clark
Wahida Clark
4x NYT Bestselling Author & Mentor

Reinforced the importance of clear communication and technical storytelling to translate critical risks into actionable business insights.

Explore My Portfolio

A structured collection of security reports, standard operating procedures, and technical investigations demonstrating applied cybersecurity skills across real-world scenarios.