🛡️
💻
🔒
🌐

Chigozie Umeh

Cybersecurity Analyst

📧 chigoziephilipumeh@gmail.com
📱 +1 (346) 302-4710
📍 San Antonio, Tx
🌐 linkedin.com/in/chigozie-umeh-security

💻 Professional Summary

Highly skilled Ethical Hacker and Cybersecurity Specialist with 8+ years of experience in penetration testing, vulnerability assessment, and security infrastructure design. Expert in deploying and managing comprehensive security monitoring environments using Proxmox, Kali Linux, and advanced open-source security tools. Proven track record of identifying critical vulnerabilities, implementing robust security measures, and training organizations on cybersecurity best practices.

🔧 Core Competencies

Penetration Testing
Vulnerability Assessment
Network Security
Proxmox Virtualization
Kali Linux
Metasploit Framework
Wireshark Analysis
Nmap Scanning
IPFS Implementation
Tor Network
Signal Protocol
Bitcoin/Blockchain
Suricata IDS
Prometheus Monitoring
Grafana Dashboards
Docker Containers
Python Scripting
Bash Automation
OSINT
Incident Response
Forensic Analysis
Compliance (SOC2, ISO27001)
Risk Assessment

🚀 Professional Experience

Security Analyst
likos.uno
Jan 2021 - Present
  • Designed and deployed enterprise-grade Proxmox virtualization infrastructure supporting 50+ security testing environments with automated provisioning and monitoring capabilities
  • Led penetration testing engagements for Fortune 500 clients, identifying 200+ critical vulnerabilities and achieving 98% remediation rate within SLA timeframes
  • Implemented comprehensive network monitoring solution using Suricata IDS, Prometheus, and Grafana, reducing incident response time by 75%
  • Developed custom Metasploit modules and Python automation scripts, increasing testing efficiency by 60% and standardizing vulnerability assessment procedures
  • Architected secure communication infrastructure using Signal Protocol and Tor networks for sensitive client communications and anonymous threat intelligence gathering
  • Established blockchain-based secure document verification system using Bitcoin and IPFS, ensuring tamper-proof audit trails for compliance reporting
  • Mentored team of 8 junior security analysts, conducting advanced training on Kali Linux, Wireshark analysis, and ethical hacking methodologies
  • Achieved SOC2 Type II and ISO27001 compliance for client environments, implementing security controls and conducting quarterly security assessments
Penetration Tester
SecureNet Technologies
Mar 2019 - Dec 2020
  • Conducted comprehensive security assessments for 40+ organizations across healthcare, finance, and technology sectors using advanced Nmap scanning and vulnerability analysis techniques
  • Built and maintained isolated testing environments using Proxmox containers, enabling safe exploitation of vulnerabilities without impacting production systems
  • Performed advanced network traffic analysis using Wireshark, identifying sophisticated APT attacks and implementing countermeasures that prevented $2M+ in potential damages
  • Developed automated vulnerability scanning framework integrating OpenVAS, Nessus, and custom Python scripts, reducing manual testing time by 45%
  • Implemented secure communication protocols for whistleblower protection using SecureDrop, Tor hidden services, and encrypted messaging systems
  • Established decentralized file storage solutions using IPFS for clients requiring censorship-resistant document management and secure data distribution
  • Delivered executive-level security briefings and technical training sessions, improving organizational security awareness by 80% as measured by phishing simulation results
  • Collaborated with law enforcement agencies on digital forensics investigations, providing expert testimony and technical analysis for cybercrime prosecutions
Information Security Analyst
TechGuard Corporation
Jun 2017 - Feb 2019
  • Managed enterprise security monitoring infrastructure using Prometheus and Grafana, providing real-time visibility into network threats and system performance across 500+ endpoints
  • Executed red team exercises using Kali Linux toolkit and Metasploit framework, successfully compromising 95% of target systems and providing detailed remediation guidance
  • Implemented privacy-focused communication channels using Matrix protocol and Signal encryption, ensuring secure internal communications for sensitive security operations
  • Deployed and configured Suricata intrusion detection system with custom rule sets, achieving 99.2% threat detection accuracy and reducing false positives by 65%
  • Conducted OSINT investigations and social engineering assessments, identifying critical information leakage and implementing data loss prevention measures
  • Established secure Bitcoin node infrastructure for cryptocurrency transaction analysis and blockchain forensics supporting law enforcement investigations
  • Automated incident response procedures using Python and Bash scripting, reducing mean time to containment from 4 hours to 45 minutes
  • Maintained Tails OS deployment for secure forensic analysis and anonymous research activities, ensuring operational security for sensitive investigations
Junior Security Researcher
CyberLabs Research Institute
Aug 2015 - May 2017
  • Researched and documented zero-day vulnerabilities in IoT devices and embedded systems, contributing to 12 CVE publications and improving industry security standards
  • Built comprehensive malware analysis laboratory using Proxmox virtualization, enabling safe reverse engineering of advanced persistent threats and ransomware families
  • Developed network reconnaissance methodologies using advanced Nmap scripting engine, creating custom NSE scripts for specialized vulnerability detection
  • Implemented secure communication protocols for research collaboration using Tor hidden services and encrypted messaging, protecting intellectual property and research data
  • Contributed to open-source security tools including Metasploit modules and Wireshark dissectors, with code accepted into official repositories
  • Established decentralized threat intelligence sharing platform using IPFS and blockchain technology, enabling anonymous collaboration between security researchers
  • Conducted security training workshops for academic institutions, teaching ethical hacking principles and responsible disclosure practices to 200+ students
  • Published 8 peer-reviewed research papers on network security, cryptographic protocols, and privacy-preserving technologies in leading cybersecurity journals

🎓 Education

Master Cybersecurity

WGU • 2025

Thesis: "Advanced Persistent Threat Detection in Virtualized Environments"

Bachelor of Management Science

2008

Magna Cum Laude • Focus: Business management

🏆 Certifications

Inviews
• CISSP - Certified Information Systems Security Professional
• CEH - Certified Ethical Hacker
• OSCP - Offensive Security Certified Professional
• GCIH - GIAC Certified Incident Handler
• CISM - Certified Information Security Manager
• CISSP - Certified Information Systems Security Professional