Security Systems Specialist

Eldon Gabriel

Secure Infrastructure | System Hardening | GRC Strategy

I provide hands-on security implementation and framework-aligned technical controls to harden enterprise systems, investigate incidents, and reduce organizational risk. As an ISC² Certified Cybersecurity Professional (CC) with 120+ documented technical labs and reports, I specialize in transforming complex IT environments into secure, compliant, and resilient infrastructures.

My work is grounded in a "Proof of Work" methodology—executing repeatable, documented security processes that strengthen systems, mitigate vulnerabilities, and support compliance readiness.

What I Bring to an Organization

System Hardening

Advanced Windows and Linux lockdown with automated IP access control. I implement deep-level GPO and Registry restrictions to reduce attack surface and enforce least privilege.

  • Server Security Evaluations
  • Least Privilege Implementation
  • Automated IP Access Control

Network Defense

pfSense orchestration and root-cause network analysis. I identify misconfigurations and unauthorized access to improve perimeter and internal defenses.

  • Enterprise IPSec VPN Troubleshooting
  • Network Traffic & DNS Diagnostics
  • Unauthorized Access Investigation

Operational Resilience

Permanent remediation and risk reduction based on NIST-aligned frameworks. I connect GRC strategy with actionable technical safeguards.

  • Bank-Grade Risk Registers
  • BYOD & Security Policy Design
  • Post-Breach Remediation Strategy

Explore Verified Skills View Technical Portfolio


Foundational Mentorship

George H. Ross
George H. Ross
NBC’s ‘The Apprentice’ Judge & Mentor

Instilled a disciplined evaluation of risks and thorough investigative practices essential for proactive threat hunting and forensic accuracy.

Wahida Clark
Wahida Clark
4x NYT Bestselling Author

Reinforced the importance of clear communication and technical storytelling to translate critical risks into actionable business insights.


Technical Case Studies

Independent Reports & Public Project Documentation

My expertise is backed by 100+ verified technical labs and reports. Due to non-disclosure agreements and academic integrity pledges (MCSI), detailed lab reports for specific curriculum milestones are available only upon direct request for verified professional inquiries.

Cloud Remediation: AWS MGN Agent Removal & Cost Mitigation (Reduced burn by 70%)
Risk Management: Bank Register Analysis
Incident Response: Unauthorized Access Case
System Hardening: Server Security Audit
Networking: IPsec VPN Solution Guide

Let's Secure Your Infrastructure

Ready to deploy NIST-aligned hardening or request a private technical review? Let's connect.

Contact Me for a Consultation

Banner

Bridging IT Fundamentals to Cybersecurity Mastery

Email Pattern Recognition with OSINT

A hands-on OSINT exercise focused on identifying and validating target email addresses using public PDF documents and email verification tools.