Chigozie Umeh
Cybersecurity Analyst
📧
chigoziephilipumeh@gmail.com
📱
+1 (346) 302-4710
📍
San Antonio, Tx
🌐
linkedin.com/in/chigozie-umeh-security
💻 Professional Summary
Highly skilled Ethical Hacker and Cybersecurity Specialist with 8+ years of experience in penetration testing, vulnerability assessment, and security infrastructure design. Expert in deploying and managing comprehensive security monitoring environments using Proxmox, Kali Linux, and advanced open-source security tools. Proven track record of identifying critical vulnerabilities, implementing robust security measures, and training organizations on cybersecurity best practices.
🔧 Core Competencies
Penetration Testing
Vulnerability Assessment
Network Security
Proxmox Virtualization
Kali Linux
Metasploit Framework
Wireshark Analysis
Nmap Scanning
IPFS Implementation
Tor Network
Signal Protocol
Bitcoin/Blockchain
Suricata IDS
Prometheus Monitoring
Grafana Dashboards
Docker Containers
Python Scripting
Bash Automation
OSINT
Incident Response
Forensic Analysis
Compliance (SOC2, ISO27001)
Risk Assessment
🚀 Professional Experience
Security Analyst
likos.uno
Jan 2021 - Present
- Designed and deployed enterprise-grade Proxmox virtualization infrastructure supporting 50+ security testing environments with automated provisioning and monitoring capabilities
- Led penetration testing engagements for Fortune 500 clients, identifying 200+ critical vulnerabilities and achieving 98% remediation rate within SLA timeframes
- Implemented comprehensive network monitoring solution using Suricata IDS, Prometheus, and Grafana, reducing incident response time by 75%
- Developed custom Metasploit modules and Python automation scripts, increasing testing efficiency by 60% and standardizing vulnerability assessment procedures
- Architected secure communication infrastructure using Signal Protocol and Tor networks for sensitive client communications and anonymous threat intelligence gathering
- Established blockchain-based secure document verification system using Bitcoin and IPFS, ensuring tamper-proof audit trails for compliance reporting
- Mentored team of 8 junior security analysts, conducting advanced training on Kali Linux, Wireshark analysis, and ethical hacking methodologies
- Achieved SOC2 Type II and ISO27001 compliance for client environments, implementing security controls and conducting quarterly security assessments
Penetration Tester
SecureNet Technologies
Mar 2019 - Dec 2020
- Conducted comprehensive security assessments for 40+ organizations across healthcare, finance, and technology sectors using advanced Nmap scanning and vulnerability analysis techniques
- Built and maintained isolated testing environments using Proxmox containers, enabling safe exploitation of vulnerabilities without impacting production systems
- Performed advanced network traffic analysis using Wireshark, identifying sophisticated APT attacks and implementing countermeasures that prevented $2M+ in potential damages
- Developed automated vulnerability scanning framework integrating OpenVAS, Nessus, and custom Python scripts, reducing manual testing time by 45%
- Implemented secure communication protocols for whistleblower protection using SecureDrop, Tor hidden services, and encrypted messaging systems
- Established decentralized file storage solutions using IPFS for clients requiring censorship-resistant document management and secure data distribution
- Delivered executive-level security briefings and technical training sessions, improving organizational security awareness by 80% as measured by phishing simulation results
- Collaborated with law enforcement agencies on digital forensics investigations, providing expert testimony and technical analysis for cybercrime prosecutions
Information Security Analyst
TechGuard Corporation
Jun 2017 - Feb 2019
- Managed enterprise security monitoring infrastructure using Prometheus and Grafana, providing real-time visibility into network threats and system performance across 500+ endpoints
- Executed red team exercises using Kali Linux toolkit and Metasploit framework, successfully compromising 95% of target systems and providing detailed remediation guidance
- Implemented privacy-focused communication channels using Matrix protocol and Signal encryption, ensuring secure internal communications for sensitive security operations
- Deployed and configured Suricata intrusion detection system with custom rule sets, achieving 99.2% threat detection accuracy and reducing false positives by 65%
- Conducted OSINT investigations and social engineering assessments, identifying critical information leakage and implementing data loss prevention measures
- Established secure Bitcoin node infrastructure for cryptocurrency transaction analysis and blockchain forensics supporting law enforcement investigations
- Automated incident response procedures using Python and Bash scripting, reducing mean time to containment from 4 hours to 45 minutes
- Maintained Tails OS deployment for secure forensic analysis and anonymous research activities, ensuring operational security for sensitive investigations
Junior Security Researcher
CyberLabs Research Institute
Aug 2015 - May 2017
- Researched and documented zero-day vulnerabilities in IoT devices and embedded systems, contributing to 12 CVE publications and improving industry security standards
- Built comprehensive malware analysis laboratory using Proxmox virtualization, enabling safe reverse engineering of advanced persistent threats and ransomware families
- Developed network reconnaissance methodologies using advanced Nmap scripting engine, creating custom NSE scripts for specialized vulnerability detection
- Implemented secure communication protocols for research collaboration using Tor hidden services and encrypted messaging, protecting intellectual property and research data
- Contributed to open-source security tools including Metasploit modules and Wireshark dissectors, with code accepted into official repositories
- Established decentralized threat intelligence sharing platform using IPFS and blockchain technology, enabling anonymous collaboration between security researchers
- Conducted security training workshops for academic institutions, teaching ethical hacking principles and responsible disclosure practices to 200+ students
- Published 8 peer-reviewed research papers on network security, cryptographic protocols, and privacy-preserving technologies in leading cybersecurity journals
🎓 Education
Master Cybersecurity
WGU • 2025
Thesis: "Advanced Persistent Threat Detection in Virtualized Environments"
Bachelor of Management Science
2008
Magna Cum Laude • Focus: Business management
🏆 Certifications
Inviews
• CISSP - Certified Information Systems Security Professional
• CEH - Certified Ethical Hacker
• OSCP - Offensive Security Certified Professional
• GCIH - GIAC Certified Incident Handler
• CISM - Certified Information Security Manager
• CISSP - Certified Information Systems Security Professional