About Metimeline
Who is Brandon Helfrich?
I recently graduated from Southeast Missouri State University, majoring in cybersecurity and minoring in computer science. I am experienced
with Linux and curently looking to pursue a career in cloud computing/security and actively looking to learn new things.
I like
to sharpen my coding skills with consistent mini projects and learn important concepts every day using online platforms such as TryHackMe and
HackTheBox. This learning journey has become an amazing hobby in itself. I am currently studying for the CompTIA Security+ certification.
Learning on TryHackMe
Virtual
Home Labs
Consistent Coding Practice
Providing Learning Platforms
Related Experience
2019 - 2023
Student - Southeast Missouri State University
I majored in Cybersecurity and minoring in Computer Science. My hope from my degree is to build a foundational understanding in network security while using those skills to learn more on my own.
2023- present
ITAM Intern -World Wide Technology
Perform responsibilities including laptop imaging, hardware maintenance, asset recovery, and hardware disposal. Assist company employees by fulfilling hardware needs via ServiceNow tickets. Create knowledge base articles by creating documentation for work processes. Complete multiple projects in a timely manner.
2022 - 2023
Tier 1 Support Technician - Big River Communications
I provided support to Big River & Circle Fiber customers via phone, email, and the ticketing system, for most issues related to telephone and internet services.
2022 - 2023
Linux Specialist - Collegiate Cyber Defense Team
Set up & hardened Linux environment for competition setting. Monitored & responded to attacks and vulnerabilities. Worked in a team environment to maintain our system.
My PortfolioMy Work
Get an inside look on some of the stuff that I've been working on.
The BlogMy Posts
Intro to Amazon Web Services (AWS)
AWS is a comprehensive, evolving cloud computing platform provided by Amazon that includes a mixture of infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as a service (SaaS) offerings. AWS services can offer an organization tools such as compute power, database storage and content delivery services.
What is Active Directory?
Active Directory is the directory service for Windows Domain Networks. It is a collection of machines and servers connected inside of domains, that are a collective part of a bigger forest of domains, that make up the Active Directory network. Active Directory contains many functioning bits and pieces and is important to understand for those getting into I.T. In this post, I will cover a few components and become fimilar with the various pieces of Active Directory.
Symbiote Malware
I recently came across an interesting post on LinkedIn covering a stealthy Linux threat that is targeting financial insitutions in Latin America. The title of the article flashed "New Linux malware 'almost impossible' to detect," with researchers dubbing the threat "Symbiote" because of its parasitic nature. Of course, the Marvel fanboy in me was instantly intrigued by the name of the newfound threat.
Honeypots
A honeypot is a security mechanism that creates a virtual trap to lure attackers. An intentionally compromised computer system allows attackers to exploit vulnerabilities so you can study them to improve your security policies. You can apply a honeypot to any computing resource from software and networks to file servers and routers.
What is Docker?
If you plan on going into cloud computing, heck even any I.T. role for that matter, you just have to know what a docker container is and what it does. What is a docker container? Well, before we can define what a docker container actually is, we first have to understand what it is replacing.
Phishing Attacks
Phishing is an example of social engineering with a touch of spoofing. It is where an attacker sends a fraudulent message designed to trick a victim into falling for a scam. This typically involves stealing financial credentials or other sensitive information. Those who fall for these scams may end up with malware, most commonly ransomware, identity theft, or data loss.
Six Phases of Incedent Response
Cybersecurity is a field that is important to pretty much every industry. A good cybersecurity system can help businesses stay safe from cybercrimes such as phishing attacks, malware attacks, and ransomware. Any organization that is serious about its cybersecurity should start with a good incident response plan.
How Does Malware Work?
The term malware refers to harmful software that may disrupt or manipulate a computer’s normal operations. Malware can infect any device that has computing capabilities; phones, tablets, personal PCs, company equipment, etc.
Contact MeMy Blogs
How To Reach Me
Feel free to reach out with project ideas or other inquiries. I can best be reached by email or on LinkedIn.
: Missouri, United States
: bran.helfrich@gmail.com
: 314-704-8504