About Jackson Joy

Cyber Security Specialist with 10 years of experience designing, implementing, and troubleshooting several Network and Security infrastructures. Collaborated with 100+ IT infrastructures and App development team to identify, prioritize and manage the remediation of vulnerabilities, also protecting organizations data, systems, and networks from cyberattacks. Dedicated to continuous learning, quick to adapt and eager to contribute the acquired skills, knowledge, and experience.

Green digital code streams vertically across the screen, resembling a hacker or cyber interface against a dark background.
Green digital code streams vertically across the screen, resembling a hacker or cyber interface against a dark background.
A person with long hair is seated at a desk, working on a computer. The computer displays lines of code, suggesting programming or software development activity. The workspace includes a modern cubicle setup with wooden and glass elements.
A person with long hair is seated at a desk, working on a computer. The computer displays lines of code, suggesting programming or software development activity. The workspace includes a modern cubicle setup with wooden and glass elements.
A network tester with a screen displaying data is placed on a server rack, surrounded by cables and networking equipment.
A network tester with a screen displaying data is placed on a server rack, surrounded by cables and networking equipment.

My Expertise

Dedicated to continuous learning and collaboration, I have worked with over 100 IT infrastructures to enhance security and resilience.

My Academic Projects

Security Intelligence for Cloud Infrastructure

As a Team Lead, Led the project with the group of 4 members

Identify and research on the potential risks associated with cloud infrastructure

Evaluated Microsoft Azure’s monitoring capabilities while executing Smurf attack on virtual environment

A collaborated project focused on fortifying cloud infrastructure security

a blue and white logo
a blue and white logo

OSINT (Open Source Intelligence)

Open-Source intelligence on an organization and Humint on the employees

To identify the system used by the organization and the vulnerabilities

Run a background check of the higher-level employees to gather personal information

Mitnick Attack

Recreated the classic Mitnick attack. Utilized the Mitnick attack on seed 20.04, to execute the attack

Spoofed an X-Terminal within the organization to get access to a trusted server without any authorization

The Mitnick attack consists of four main steps: Sequence number prediction, SYN flooding attack on the trusted server, spoofing a TCP connection, running a remote shell

opened black laptop computer
opened black laptop computer

My Highest Qualification

Successfully completed Master of Science in Cybersecurity from Pace University's Seidenberg School of Computer Science and Information Systems. During my time there, I gained knowledge in Operating Systems, Network Security & Defense, Ethical Hacking & Penetration Testing, Malware Analysis & Reverse Engineering, Information Security Management, Cyber Intelligence Analysis & Modelling, Information Security Planning and Policy, Information Security Auditing & Risk Management, Automating Information Security Python & Shell.

Frequently Asked Questions

What is your experience level?

I have 10 years of experience in cybersecurity, focusing on network and security infrastructures.

How do you protect data?
What services do you offer?
What is your collaboration approach?
What are your learning methods?

I am dedicated to continuous learning and adapting quickly to new challenges in cybersecurity.

I collaborate with IT and app development teams to manage vulnerabilities and enhance security measures effectively.

I focus on protecting organizations from cyberattacks by implementing robust security protocols and strategies.

I prioritize identifying and remediating vulnerabilities in systems and networks to ensure data protection.

A person with a striped shirt and a cap is standing in front of a computer screen displaying data and analytics. Another laptop is open on a desk below the monitor, and a large metallic tank with a pressure gauge is nearby.
A person with a striped shirt and a cap is standing in front of a computer screen displaying data and analytics. Another laptop is open on a desk below the monitor, and a large metallic tank with a pressure gauge is nearby.

Cybersecurity Expertise