My name is Joshua Williams. I am a professional penetration tester and cybersecurity engineer. Outside of work, I enjoy completing CTF style boxes on platforms such as TryHackMe and HackTheBox. I also enjoy tinkering in my home lab, often working on automation projects or testing out new exploits.

Certifications

  • Offensive Security Certified Professional (OSCP) - 2023
  • Certified Professional Penetration Tester (eCPPT) - 2022
  • Pentest+ - 2021
  • Security+ - 2021
  • Microsoft Azure Fundamentals - 2020

Skills

  • Penetration Testing
  • Security Auditing
  • Vulnerability Assessments
Tools:
  • Burp Suite
  • Nmap
  • NetExec
  • Responder
  • Metasploit
  • Gobuster
  • Hashcat
  • Nessus
Programming Languages:
  • Python
  • Powershell
  • Javascript
Technologies:
  • Microsoft Azure
  • Windows
  • Linux
  • Ansible
  • DevOps Pipelines
  • Terraform
Compliance Frameworks:
  • HIPAA
  • SOC 2
  • NIST 800-53
  • FedRAMP

Accomplishments

  • 1st Place - 2022 Nolacon Technical CTF
  • 1st Place - 2019 Nolacon OSINT CTF

Education

  • Master of Professional Studies (MPS) in Cybersecurity Management - Tulane University
  • Bachelor of Science (BS) with Dual Majors in Applied Computing Systems and Homeland Security Studies - Tulane University
  • Associate of Applied Science in Computer Networking and Systems Administration - Texas State Technical College

Projects

  • Homelab:

    • Homelab virtualized in ProxMox with multiple internal networks running Linux and Windows hosts. Technologies utilized include Terraform, Packer, Hashicorp Vault, Ansible, Wireguard and Grafana.
  • Cisco ASA Automation:

    • Developed an ansible playbook to backup the configuration of Cisco ASA firewalls, store them in a git repo for version control and back them up to Azure Blob Storage.
  • Mirth Automation:

    • Developed Powershell script to automate the deployment of Mirth Channels.