Security Systems Specialist

Eldon Gabriel

Secure Infrastructure | System Hardening | GRC Strategy

I implement practical security controls that harden enterprise systems, investigate operational issues, and reduce organizational risk. As an ISC² Certified Cybersecurity Professional (CC) with 100+ documented technical labs and reports, my work focuses on securing real IT environments through repeatable system administration and defensive security practices.

My portfolio follows a Proof of Work methodology, where every security concept is demonstrated through hands-on implementation and documented technical analysis. These projects include system hardening, network security configuration, incident troubleshooting, and infrastructure protection using industry-aligned security frameworks.

The goal is simple: convert security theory into operational controls that are measurable, defensible, and ready for real-world environments.

What I Bring to an Organization

System Hardening

Advanced Windows and Linux lockdown with automated IP access control. I implement deep-level GPO and Registry restrictions to reduce attack surface and enforce least privilege.

  • Server Security Evaluations
  • Least Privilege Implementation
  • Automated IP Access Control

Network Defense

pfSense orchestration and root-cause network analysis. I identify misconfigurations and unauthorized access to improve perimeter and internal defenses.

  • Enterprise IPSec VPN Troubleshooting
  • Network Traffic & DNS Diagnostics
  • Unauthorized Access Investigation

Operational Resilience

Permanent remediation and risk reduction based on NIST-aligned frameworks. I connect GRC strategy with actionable technical safeguards.

  • Bank-Grade Risk Registers
  • BYOD & Security Policy Design
  • Post-Breach Remediation Strategy

Explore Key Career Milestones & Certifications


Foundational Mentorship

George H. Ross
George H. Ross
NBC’s ‘The Apprentice’ Judge & Mentor

Instilled a disciplined evaluation of risks and thorough investigative practices essential for proactive threat hunting and forensic accuracy.

Wahida Clark
Wahida Clark
4x NYT Bestselling Author

Reinforced the importance of clear communication and technical storytelling to translate critical risks into actionable business insights.

See My Real-World Technical Experience


Banner

Bridging IT, Security, and Risk Management into Cybersecurity Mastery

Email Pattern Recognition with OSINT

A hands-on OSINT exercise focused on identifying and validating target email addresses using public PDF documents and email verification tools.