About Jackson Joy
Cyber Security Specialist with 10 years of experience designing, implementing, and troubleshooting several Network and Security infrastructures. Collaborated with 100+ IT infrastructures and App development team to identify, prioritize and manage the remediation of vulnerabilities, also protecting organizations data, systems, and networks from cyberattacks. Dedicated to continuous learning, quick to adapt and eager to contribute the acquired skills, knowledge, and experience.
My Expertise
Dedicated to continuous learning and collaboration, I have worked with over 100 IT infrastructures to enhance security and resilience.
My Academic Projects
Security Intelligence for Cloud Infrastructure
As a Team Lead, Led the project with the group of 4 members
Identify and research on the potential risks associated with cloud infrastructure
Evaluated Microsoft Azure’s monitoring capabilities while executing Smurf attack on virtual environment
A collaborated project focused on fortifying cloud infrastructure security
OSINT (Open Source Intelligence)
Open-Source intelligence on an organization and Humint on the employees
To identify the system used by the organization and the vulnerabilities
Run a background check of the higher-level employees to gather personal information
Mitnick Attack
Recreated the classic Mitnick attack. Utilized the Mitnick attack on seed 20.04, to execute the attack
Spoofed an X-Terminal within the organization to get access to a trusted server without any authorization
The Mitnick attack consists of four main steps: Sequence number prediction, SYN flooding attack on the trusted server, spoofing a TCP connection, running a remote shell
My Highest Qualification
Successfully completed Master of Science in Cybersecurity from Pace University's Seidenberg School of Computer Science and Information Systems. During my time there, I gained knowledge in Operating Systems, Network Security & Defense, Ethical Hacking & Penetration Testing, Malware Analysis & Reverse Engineering, Information Security Management, Cyber Intelligence Analysis & Modelling, Information Security Planning and Policy, Information Security Auditing & Risk Management, Automating Information Security Python & Shell.


Frequently Asked Questions
What is your experience level?
I have 10 years of experience in cybersecurity, focusing on network and security infrastructures.
How do you protect data?
What services do you offer?
What is your collaboration approach?
What are your learning methods?
I am dedicated to continuous learning and adapting quickly to new challenges in cybersecurity.
I collaborate with IT and app development teams to manage vulnerabilities and enhance security measures effectively.
I focus on protecting organizations from cyberattacks by implementing robust security protocols and strategies.
I prioritize identifying and remediating vulnerabilities in systems and networks to ensure data protection.
Cybersecurity Expertise