About Me
My name is Joshua Williams. I am a professional penetration tester and cybersecurity engineer. Outside of work, I enjoy completing CTF style boxes on platforms such as TryHackMe and HackTheBox. I also enjoy tinkering in my home lab, often working on automation projects or testing out new exploits.
Certifications⌗
- Offensive Security Certified Professional (OSCP) - 2023
- Certified Professional Penetration Tester (eCPPT) - 2022
- Pentest+ - 2021
- Security+ - 2021
- Microsoft Azure Fundamentals - 2020
Skills⌗
- Penetration Testing
- Security Auditing
- Vulnerability Assessments
Tools:⌗
- Burp Suite
- Nmap
- NetExec
- Responder
- Metasploit
- Gobuster
- Hashcat
- Nessus
Programming Languages:⌗
- Python
- Powershell
- Javascript
Technologies:⌗
- Microsoft Azure
- Windows
- Linux
- Ansible
- DevOps Pipelines
- Terraform
Compliance Frameworks:⌗
- HIPAA
- SOC 2
- NIST 800-53
- FedRAMP
Accomplishments⌗
- 1st Place - 2022 Nolacon Technical CTF
- 1st Place - 2019 Nolacon OSINT CTF
Education⌗
- Master of Professional Studies (MPS) in Cybersecurity Management - Tulane University
- Bachelor of Science (BS) with Dual Majors in Applied Computing Systems and Homeland Security Studies - Tulane University
- Associate of Applied Science in Computer Networking and Systems Administration - Texas State Technical College
Projects⌗
-
Homelab:
- Homelab virtualized in ProxMox with multiple internal networks running Linux and Windows hosts. Technologies utilized include Terraform, Packer, Hashicorp Vault, Ansible, Wireguard and Grafana.
-
Cisco ASA Automation:
- Developed an ansible playbook to backup the configuration of Cisco ASA firewalls, store them in a git repo for version control and back them up to Azure Blob Storage.
-
Mirth Automation:
- Developed Powershell script to automate the deployment of Mirth Channels.