About me

Hello, I’m Atahan, a cybersecurity and network engineer based in Istanbul, Turkey. I have a strong academic background and practical experience in the field of cybersecurity and network engineering. I graduated from Purdue University in West Lafayette, Indiana, USA with a Bachelor of Science in Computer Information Technology, where I completed a double major in Cybersecurity and Network Engineering Technology. I learned various skills and concepts related to cybersecurity and network engineering, such as penetration testing, vulnerability scanning, incident response, digital forensics, as well as designing, configuring, securing, and troubleshooting networks.

I am currently looking for new opportunities to apply my knowledge and skills in the industry. I am open to relocation or remote work, as I enjoy working in diverse and dynamic environments. I am also eager to learn new things and challenge myself in different projects and tasks. I have a passion for cybersecurity and network engineering, and I want to contribute to the advancement and innovation of these fields.

I would love to connect with you if you share my interests or have any questions about my background and qualifications. You can reach me through LinkedIn or email. Thank you for your time and attention!

What I do

  • laptop

    Incident Response

    I identify and resolve security incidents that may affect your data and systems. I use OSSEC, ELK Stack, and SIEM to detect, investigate, and respond to cyber threats. I can monitor and analyze your hosts, collect and visualize your data, and generate alerts and reports for security monitoring and incident response. I can also perform OS hardening, which is the process of securing your operating system by applying patches, disabling unnecessary services, configuring firewall rules, enforcing password policies, etc. to reduce the attack surface and prevent unauthorized access. I can help you protect your assets, identify vulnerabilities, mitigate risks, and recover from incidents.

  • wifi

    Enterprise Networking

    I design and test wired and wireless network infrastructure with various tools and technologies. I can use static, RIP, EIGRP, and OSPF routing protocols, OpenVPN, IPsec, and L2TP VPN protocols to enable and secure data exchange between different networks. I can also use VLANs and Switching functions to segment and optimize network traffic. I can install and configure firewalls to protect network resources from unauthorized access and attacks. I can deploy and maintain wireless networking solutions to provide wireless access to users and devices. I use Cisco, Aruba, and Ubiquiti networking devices to build reliable and scalable network infrastructure.

  • wifi

    Digital Forensics

    I perform digital forensics analysis on disks, disk images, mobile devices, and cloud services with tools like Autopsy, OSForensics, AXIOM, and Cellebrite. I can extract, examine, and report evidence from various sources, such as files, emails, chats, browsers, etc. I can also recover deleted or hidden data, decrypt passwords, and identify malware. I can handle different types of mobile devices, such as android and ios, and access cloud data from platforms like Google Drive, iCloud, Dropbox, etc.

  • wifi

    Virtualization

    I am skilled in virtualizing or containerizing various operating systems, applications and devices with tools like VMware vSphere , VMware ESXi, and Docker. I can manage virtual machines, storage, and networking resources, as well as create and run containers. I can also set up and secure small enterprise networks with firewalls, switches, zones, and active directory. I can use virtualization to make operating systems isolated, scalable, and portable.

Resume

Education

  1. Purdue University

    2018-2022 B.S in Computer and Information Technology

    Majors: Cybersecurity & Network Engineering Technology

    Notable Coursework: Cyber Forensics, Cybersecurity Fundamentals, Data Communications and Networking, Database Fundamentals, Incident Response Management, Internet Design and Implementation, Systems Development, Intro to Cryptography, Network Administration, Network Security, Object Oriented Programming, Storage Area Networking, Systems Administration, Systems Programming, UNIX fundamentals, Wireless Networks, Vulnerability Analysis and Testing, Social Engineering, Systems Analysis and Design, Cyber Criminology

Project Experience

More detailed explanation or showcase of the below mentioned projects can be found on the portfolio section and on my GitHub page.

  1. TryHackMe & HackTheBox

    2022 — Present

    • Completed over 70 rooms and ranked in the top 3% on TryHackMe, an online platform for learning and practicing cybersecurity skills.

  2. Personal Website V2

    2022 — Present

    • Redesigned my personal portfolio website.
    • Tech Stack: HTML, JavaScript, CSS, Github Pages

  3. Homelab

    2022 — Present

    • Constructed and configured home lab with Raspberry Pis running PiKVM and Pi-hole, and Ubuntu Server with automated deployment of Docker containers of 10+ services with Ansible playbook, resulting in an 80% reduction in deployment time.
    • Click here to go the repository of the Ansible playbook.

  4. Personal Website V1

    2021 — 2022

    • Designed and coded personal website to showcase previous personal projects and course lab work.
    • Tech Stack: Next.js, Chakra UI, Framer Motion, Vercel.
    • Click here to preview the previous version of my personal website.

  5. Digital Forensics Lab

    2021 — 2022

    • Achieved 95% data loss reduction by recovering data from computers and mobile devices using disk and data capture tools; applied cyber forensics techniques and disaster recovery plans, ensuring data integrity and security.

  6. Incident Response Lab

    2021 — 2022

    • Designed and deployed enterprise network with 9 hosts in accordance with Computer Incident Response Plan (CIRP); tested and monitored security using ELK Stack, OSSEC, and simulated attacks based on Confidentiality, Integrity, and Availability (CIA) triad; hardened Ubuntu servers, increasing OS security by 50%.

  7. Vulnerability Analysis Lab

    2021 — 2022

    • Assessed and exploited vulnerabilities on web applications (Metasploitable 2, DVWA, Websploit) and Windows 10 using scanning tools (Nmap, OpenVAS), exploitation tools (Burp Suite, msfconsole), and reconnaissance tools (metagoofil, Shodan, recon-ng, Maltego), found and fixed critical vulnerabilities that lowered the risk exposure by 30%.

  8. Programming & Bash/Shell Scripting

    2020 — 2022

    • Developped a simple Wheel of Fortune game using Python.
    • Developped several applications using C, Java, Python and C#.
    • Experiencened with bash/shell scripting.
    • Utilized Oracle SQL to filter out a database and created ERD designs of a database.

  9. Network Infrastructure Projects

    2018 — 2022

    • Designed, configured, and tested enterprise wired and wireless networks using industry-leading Cisco, Aruba, and Ubiquiti products and different routing protocols such as Static, RIP, EIGRP, and OSPF; resulting in a 30% improvement in network performance and security.
    • Tested VPN protocols such as OpenVPN, IPsec, and L2TP using pfSense and VyOS firewalls and Active Directory domain controllers on the network; enhanced remote access and VPN security and reliability by 40% for 15 hosts and 6 network zones.
    • Devised a network plan including 12 hosts and 4 network zones implementing firewall zones, AD, load balancer, proxy, DNS, and a mail server; achieved a 30% reduction in network downtime, latency, and errors.

  10. Raspberry Pi Security Camera

    2018 — 2018

    • Built a Raspberry Pi security camera with motion detection capabilities by utilizing OpenCV and Python, that noties via email.

My SKills

  1. Programming: Python, Java, C, C#, SQL, Bash, git

  2. Data Visualization: Tableau, PowerBI

  3. Web Design: JavaScript, HTML, CSS, Wordpress

  4. Operating Systems: Windows, Windows Server, Linux (Kali, Ubuntu, CentOS, Debian, Arch), FreeBSD, MacOS

  5. Tools: Wireshark, Nmap, OSSEC, ELK Stack / Elasticsearch, Metasploit, Nessus

  6. Networking: TCP/IP, Routing Protocols, VPN Protocols, VLANs, Switching, 802.1x, Wireless Networking, Firewalls

  7. Firewalls: pfSense, VyOS

  8. Digital Forensics: Autopsy, OSForensics, Magnet AXIOM, Cellebrite

  9. Virtualization: VMware ESXI, VMware Workstation, Virtualbox, Parallels, UTM, Docker, TrueNAS

  10. Hardware: Raspberry Pi, Cisco IOS Networking Devices, Aruba Networking Gear, Ubiquiti Network Hardware

  11. Knowledge: Penetration Testing, Forensics Investigation, Risk Assessment, Intrusion Detection, Troubleshooting, Active Directory, Incident Response, Virtualization

Portfolio

Click on 'All' button to make sure all project elements are loaded.