Eldon Gabriel
Secure Infrastructure | System Hardening | GRC to Technical Enforcement
I implement practical security controls that harden enterprise systems, investigate operational issues, and reduce organizational risk. As an ISC² Certified Cybersecurity Professional (CC) with 100+ documented technical labs and reports, my work focuses on securing real IT environments through repeatable system administration and defensive security practices.
My portfolio follows a Proof of Work methodology, where every security concept is demonstrated through hands-on implementation and documented technical analysis. These projects include system hardening, network security configuration, incident troubleshooting, and infrastructure protection using industry-aligned security frameworks.
The goal is simple: convert security theory into operational controls that are measurable, defensible, and ready for real-world environments.
This portfolio is continuously updated as new labs, projects, and troubleshooting scenarios are completed. It serves as a working reference of applied security practices, documenting both implementation and problem resolution across systems, networks, and security operations.
What I Bring to an Organization
System Hardening & Control Enforcement
I implement enforced security controls across Windows and Linux systems to reduce attack surface and ensure least privilege at the system level. This includes CIS Benchmarks-aligned Group Policy, registry hardening, and controlled IP-based access restrictions.
Network Security & Defense
I secure network environments by identifying misconfigurations, enforcing firewall rules, and validating access controls. My work includes pfSense configuration, IPsec VPN troubleshooting, and traffic and DNS analysis to detect unauthorized activity.
GRC Implementation & Operational Resilience
I translate governance and risk frameworks into enforced technical safeguards. This includes NIST-aligned control implementation, risk register mapping, policy enforcement, and post-breach remediation to ensure controls remain effective and auditable.
Explore Key Career Milestones & Certifications
Foundational Mentorship

George H. Ross
NBC’s ‘The Apprentice’ Judge & Mentor
Instilled a disciplined evaluation of risks and thorough investigative practices essential for proactive threat hunting and forensic accuracy.

Wahida Clark
4x NYT Bestselling Author & Mentor
Reinforced the importance of clear communication and technical storytelling to translate critical risks into actionable business insights.
See My Real-World Technical Experience

REPORT – pfSense APIPA Failure – v1.0.0
Loss of pfSense WebGUI access caused by APIPA addressing on the client system, resolved through static IP reconfiguration and connectivity validation.
SOP - Access Control Incident & NIST Alignment - v1.2.1
Analysis of a data exposure incident caused by weak access controls and lack of enforced security policies.
REPORT – Enterprise Hybrid-Cloud Migration – v1.2.0
A practical troubleshooting case study on migrating VMware virtual machines to AWS EC2 and resolving kernel driver removal issues from the AWS Application Migration Service.
GUIDE – vSphere 8 Nested Lab on AMD Ryzen 6000 – v1.0.0
A technical deep-dive into enabling nested virtualization on restricted AMD mobile platforms by bypassing OEM firmware locks and Windows 11 VBS.
REPORT – AD Disaster Recovery & Identity Restoration – v1.0.2
Successful restoration of an Active Directory environment using Bare-Metal Recovery (BMR) and System State restoration on Windows Server 2016.
GUIDE – Backup and Restore Using Duplicati CLI – v1.0.1
Execution and validation of command-line based backup and recovery workflows using Duplicati to ensure data recoverability and integrity.
REPORT – SAR Performance Monitoring on Ubuntu – v1.0.1
Implementation and analysis of system performance monitoring on Ubuntu using the System Activity Reporter (SAR) to identify resource bottlenecks and abnormal activity.
SOP – Secure Linux Management with Cockpit – v1.0.1
Using Cockpit to manage and secure multiple Linux systems from a single web interface.
REPORT – Webmin Secure Administration (Dual-Homed) – v1.1.0
Securing a dual-homed Webmin administration server through PAM-based authentication, interface mapping, and IP-based firewall hardening.
REPORT – Geolocation and Image Verification Analysis – v1.0.0
Application of advanced reverse image search and visual analysis techniques to verify artifacts and geolocate global landmarks.