HeavensG8 Security
Aspiring Cybersecurity Professional | Security Fundamentals | Hands on Labs
Aspiring Cybersecurity Professional | Security Fundamentals | Hands on Labs
Hi! I'm Alexis Jackson, an aspiring cyber security professional with a background in criminal justice and a growing focus on protecting systems, data and people. I'm currently building hands on experience through labs and projects that emphasize security fundamentals such as incident response, policy development, risk awareness, and secure system practices. This portfolio showcases my ability to translate academic research, investigative frameworks, and security tools into real-world security applications. Each project demonstrates analytical thinking, risk assessment, and security focused decision making .
Behavioral Analysis of Security Risk
Excerpt from original behavioral risk analysis mapping criminological theory to cybersecurity threats.
Overview: This project examines how human behavior and decision making contribute to security risks within organizations. originally rooted in criminological theory, the analysis is reframed to address cybersecurity concerns such as insider threat, policy non compliance, and social engineering vulnerabilities.
Key Behavioral Factors & Security Implications:
Behavioral Concept Cybersecurity Application
Risk Likelihood of bypassing security controls or exposing sensitive data
Impulsiveness Vulnerabilities to phishing, malicious links or unsafe downloads
Emotional Volatility Increased risk of disgruntled employee or insider threat activity
Self Discipline Adherence to password policies, MFA, and acceptable use guidelines
High Risk Motivation Potential for malicious insider actions
Overview: This project evaluates commonly used cybersecurity tools and explains how layered defenses improve organizational security. the analysis demonstrates foundational knowledge of endpoint protection, firewalls, and network monitoring.
Tools Reviewed:
Firewalls & Endpoint Security
ZoneAlarm - Host based Firewall protection
Comodo Firewall - Inbound and outbound traffic control
Outpost Security - Anti malware and anti phishing protection.
Antivirus & Endpoint Protection
Bitdefender - Real time malware detection and ransomware protection
Kaspersky - Endpoint security and system protection
Norton - Antivirus and identity protection
Network & DNS Security
GlassWire - Network traffic visualization and alerting
OpenDNS (Cisco) - DNS based phishing and malware protection
This project emphasizes layered security controls, complementary tools to reduce single points of failure along with endpoint, network, and DNS level protection.
Cybersecurity Investigation Tools Analysis
Original comparison highlighting endpoint, network, and DNS security tools used in defense strategies.
Cyber Investigation Policy development
Overview: This project outlines the creation of a cybersecurity investigation policy for an organization. The policy balances security needs, legal requirements, and privacy considerations.
Policy Development Process
Conduct organizational risk assessment
Define scope, authority and objectives
Align with legal and regulatory standards
Draft, review, and update policy regularly
Core Policy Elements
Authorization & Roles
Incident Response
Evidence Handling
Privacy & Compliance
Training & Awareness
Distinctive Investigative Areas
Digital evidence preservation
Incident response and forensic analysis
Privacy and data protection
Excerpt from an original cyber investigation policy framework developed for investigative and compliance use.
Through this project, I demonstrated the ability to write and evaluate security policies, develop structured incident response plans, and understand the legal and compliance considerations. The work also reflects an awareness of governance, and risk management principles. Putting an emphasis on accountability, structure, and controlled decision making within secure environments.