BENJAMIN EVANS

CYBERSECURITY ANALYST (ENTRY-LEVEL)

PROFILE

Self-taught cybersecurity professional with over 15 years of experience working hands-on with computer systems and a strong foundation in network traffic analysis, threat detection, and Linux-based security environments. Recently completed the Google Cybersecurity Certificate, with additional independent training in Wireshark, SIEM tools, and Ghidra for reverse engineering. Comfortable building lab environments, analyzing logs, and automating tasks with Python. Looking to contribute to a SOC or security team in an entry-level analyst role, bringing a practical, problem-solving mindset, strong attention to detail, and an eagerness to grow within the field.

TECHNICAL SKILLS

Security & Network Analysis

Packet capture & analysis (Wireshark) Traffic investigation (TCPDump, Zeek) Basic intrusion detection (Suricata) MITRE ATT&CK Threat indicators Log correlation

SIEM & Log Analysis

OSSIM ELK Stack Graylog Event correlation Alert triage Rule creation Log review (Firewalls, Linux, IDS)

System Security & Hardening

Linux (Ubuntu, Debian, Kali) Hardened lab environments Firewall rules User access controls Encrypted backup systems

Reverse Engineering (Beginner-Intermediate)

Static analysis (Ghidra) Malware sample review String/API call extraction Basic obfuscation patterns

Programming & Scripting

Python (Log parsing, alerting, file handling) Bash scripting (System tasks, audit) Git/GitHub

EDUCATION & CERTIFICATIONS

Google Cybersecurity Certificate (2025)

  • Completed training in threat detection, risk management, incident response, and SIEM analysis
  • Hands-on labs focused on packet capture, security tooling, and systems auditing

Athabasca University - General Arts (Ongoing)

  • Developing research, systems thinking, and communication skills

Additional Training

  • TryHackMe Blue Team and SOC Paths (in progress)
  • Studying for CompTIA Security+ (expected later this year)

ADDITIONAL SKILLS

  • Excellent written and verbal communication
  • Comfortable with technical documentation and process notes
  • Self-managed learner with proven discipline in lab work
  • Visual thinker with a background in design, supporting clarity in reporting
  • Team-oriented mindset, eager to learn and contribute

Languages

English (Fluent)

EXPERIENCE

Freelance Technical Work / Personal Cybersecurity Projects

2019 - Present

  • Built a home security lab using Linux, Docker containers, and open-source security tools
  • Regularly analyze packet captures to identify anomalies, unusual traffic patterns, and potential threats
  • Developed basic Python scripts for parsing syslogs, identifying failed login attempts, and tracking suspicious activity
  • Created lab environments to simulate security events and test detection tools
  • Conducted basic malware triage in a safe virtual environment, extracting IOCs and observing behavior
  • Documented all findings in GitHub and internal logs to track skill development and processes

Toast Canna & W.E. Repair Systems - Owner / Technician

2019 - 2025

  • Maintained secure systems for small business operations, including encrypted backups and client data protection
  • Implemented privacy-first workflows and safe computing practices for creative clients and customers
  • Diagnosed and resolved hundreds of system-level issues for Windows and Linux machines
  • Provided tech support with a focus on clarity, security awareness, and long-term reliability
  • Built a reputation on trust, consistent delivery, and professionalism across multiple disciplines

PROJECTS

Home Security Lab

  • Built from scratch using Linux, Docker, and OSS tools
  • Installed and configured Suricata, Zeek, Elasticsearch, and Kibana
  • Captured and analyzed attack simulations including SSH brute force and port scanning

Wireshark Analysis Lab

  • Collected and filtered packet captures
  • Identified suspicious domains, malformed packets, and DNS tunneling patterns
  • Practiced interpreting application-layer protocols

Reverse Engineering Samples (Ghidra Practice)

  • Disassembled small Windows malware binaries
  • Traced function calls and observed behavior in sandbox
  • Gained working familiarity with Ghidra interface and binary structure basics