Skip to content
View BrandyHaynes-cybertech's full-sized avatar

Block or report BrandyHaynes-cybertech

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Brandy Haynes Signature

🛡️ Mission I bridge the gap between high-pressure operational environments and cybersecurity infrastructure. My focus is on threat detection, log analysis, and engineering solutions to solve complex technical problems.
🎓 Education 🔹 B.S. Cybersecurity Technology | University of Maryland (UMGC)
🔹 Cisco & A+ Certifications | Texarkana College
🔹 AWS Academy Cloud Architecting | AWS
🎯 Core Focus SOC Operations • Threat Hunting • Network Defense • Incident Response
🛠️ Technical Stack SIEM & Logging:

Networking & Traffic:

Systems & Cloud:
🔗 Connect


Strategic infrastructure and systems management across diverse environments.
🏢
Wesco RV & Bus Inc.

Focus: Systems Administration • Data Integrity • Network Administration
  • Forensic Reconstruction: Performed deep-tier QuickBooks data remediation to correct multi-year discrepancies and restore database integrity.
  • Network Audit & Optimization: Mapped the existing infrastructure to identify and decommission redundant hardware, including "ghost" routers, to streamline network traffic.
  • Infrastructure Cost-Reduction: Orchestrated a complete migration of ISP and VOIP phone providers, securing more reliable service while significantly reducing monthly overhead.
  • Technical Liaison: Served as the primary on-site lead for hardware/software incident response and vendor escalation to maintain 100% system uptime.
🏫
Educational Systems & Operations

IT Soft Skills: Home Network Management • Compliance Bookkeeping • Endpoint Security
  • Infrastructure Management: Provisioned and maintained a dedicated home network environment for Texas Lone Star Academy and Acellus curriculum, ensuring 100% uptime.
  • Technical Support: Acted as the primary on-site lead for hardware troubleshooting, ISP connectivity issues, and software updates to prevent downtime.
  • Access Control & Safety: Implemented user permissions and content filtering to maintain a secure, compliant digital learning space.
  • Operational Bookkeeping: Managed detailed records and progress logs required for academy compliance, ensuring all digital "paperwork" was accurate and submitted on schedule.
🏭
CMC Steel Arkansas

Focus: Research • Asset Management • Hardware Deployment
  • Infrastructure Lighting Project: Researched and authored a comprehensive facility lighting upgrade proposal; the project was successfully implemented plant-wide to improve operational safety and efficiency.
  • Workstation Deployment: Executed hardware setup and cabling for 20+ computer workstations in an industrial environment.


Foundational soft skills in high-pressure environments, protocol adherence, and systems discipline.
🏫
Educational Systems & Operations

IT Soft Skills: End-User Training • Documentation & Reporting • Remote Troubleshooting • Curriculum Platform Management
  • End-User Training: Provided hands-on technical instruction and support to students navigating digital learning platforms, directly mirroring Help Desk / Tier 1 Support responsibilities.
  • Documentation & Reporting: Maintained detailed compliance records and progress logs, ensuring all digital "paperwork" was accurate and submitted on schedule.
  • Remote Troubleshooting: Independently resolved ISP connectivity issues, hardware failures, and software errors with no external IT support.
👟
Shoe Dept. Encore

IT Soft Skills: Customer Success • Troubleshooting • POS Integrity
  • System Operations: Daily use of proprietary Point of Sale (POS) systems, ensuring data accuracy and secure transaction handling.
  • Technical Communication: Translated complex transaction or inventory issues into clear solutions for customers, similar to Help Desk / Tier 1 Support.
  • Real-Time Problem Solving: Resolved system errors and hardware glitches during high-volume operations to maintain business continuity.
🏢
Wesco RV & Bus Inc.

IT Soft Skills: Vendor Liaison • Professional Accountability
  • Operational Continuity: Managed business-critical scheduling and parts procurement, ensuring all "system pieces" moved together.
  • Regulatory Compliance: Handled warranty documentation and state-required record keeping with 100% accuracy.
⚖️
Barry Telford Unit

IT Soft Skills: Conflict De-escalation • Crisis Management • Technical Documentation
  • Incident Reporting: Authored precise, legally-defensible logs and incident reports — a direct precursor to Cybersecurity Incident Documentation.
  • Protocol Adherence: Maintained 100% compliance with strict state safety and security mandates, demonstrating the discipline required for Security Policy Enforcement.
  • High-Pressure Resolution: Managed real-time conflict resolution and situational awareness in a high-stakes environment.


🔬
Digital Forensics

Topics: Digital Evidence • Search Warrants • Legal Doctrines • Cloud Forensics • IoT Evidence • Ethics • Emerging Threats
  • Assignment 1: Digital Evidence, Search Warrants & Legal Doctrines
  • Assignment 3: Ethics, Cloud Forensics, IoT Evidence & Emerging Threats
📁 View Repository
☁️
Cloud Computing & AWS

Topics: AWS VPC Architecture • EC2 Deployment • Network Security • Cloud Vendor Analysis • Infrastructure Cost Reduction
  • Assignment 1: Executive Summary — Cloud Migration Strategy
  • Assignment 2: Cloud Vendor Presentation — AWS vs Azure vs GCP
  • Assignment 3: Proof of Concept — Built a VPC & Launched an EC2 Web Server on AWS
📁 View Repository  |  ✅ AWS Academy Verified Badge
🏥
Healthcare Cybersecurity

Topics: IoMT CVE Research • Physical Security Planning • HIPAA/PII/PHI Compliance • Hospital Security Architecture
  • Project 1: IoMT Vulnerability Memo — CVE analysis on 3 medical devices
  • Project 2: Physical Security Plan — camera placement, access control & staff training
  • Project 3: HIPAA, PII & PHI Employee Training Presentation
📁 View Repository  |  CompTIA Security+ Practice Score: 96%
📋
Security Management Briefings

Topics: RACI Matrix • Cryptography • VPN Protocols • Access Controls • Security Auditing • Physical Security • Secure SDLC
  • Briefing 2: RACI Matrix & Organizational Security Roles
  • Briefing 3: Cryptography — Symmetric vs Asymmetric Encryption
  • Briefing 4: VPN Protocols for Remote Work Security
  • Briefing 5: Access Controls & Insider Threat Mitigation
  • Briefing 6: Remote Work Device Security Audit
  • Briefing 7: Physical Security for Unoccupied Facilities
  • Briefing 8: Software Development Security & CMMI Level 3
📁 View Repository
🎓
Cybersecurity Technology Capstone

Topics: AWS EC2 & Windows VM Deployment • IP Subnetting & CIDR • EFS & S3 • SDN & IBN Architecture • Supply Chain Attack Analysis • Cybersecurity Law & Policy • GDPR vs US Law
  • Project 1: Virtualization & AWS Lab — EC2 provisioning, SSH, Linux administration, Type 1 vs Type 2 hypervisor security analysis
  • Project 2: Cloud Computing Lab — Windows VM, EFS, S3, IP subnetting calculations, full AWS vs GCP vs Azure comparison
  • Project 3: SDN & IBN Whitepaper — Professional whitepaper on software-defined and intent-based networking vs traditional infrastructure
  • Project 4: Threat Landscape Analysis — SolarWinds & MOVEit supply chain attack case studies, IoT & cloud vulnerability analysis
  • Project 5: Cybersecurity Law & Policy — GDPR vs US data protection law, OPM breach case study & federal policy recommendations
📁 View Repository
🏠
Home Network Projects

Topics: Home Network Troubleshooting • MAC Addressing & DHCP • IoT Device Setup • Network Segmentation • Parental Controls • Mesh Network Configuration
  • Case Study 01: Amazon Kids Tablet — Wi-Fi & Server Connection Fix — MAC randomization, device profiles, DHCP
  • Case Study 02: Arlo Camera Setup, Troubleshooting & Network Expansion — IoT isolation, mesh expansion, network congestion
📁 View Repository
🎯
Forage Job Simulations

Topics: Phishing Analysis • Incident Response • Log Analysis • Threat Identification • Remediation Planning
  • Mastercard: Designed phishing email simulations — analyzed suspicious emails and implemented security protocols to prevent credential theft
  • Deloitte: Supported client through active cyber breach — analyzed web activity logs, identified data breach patterns, and developed remediation strategies
📁 View Repository
🖥️
TryHackMe Hands-On Training

Topics: Linux & Windows Administration • Networking • Metasploit • Wireshark • Nmap • Cryptography • SOC Operations • Offensive & Defensive Security
  • Badges Earned: 🐧 cat linux.txt — Linux competency | 🛡️ Metasploitable — Metasploit knowledge
  • Rooms Completed: Linux Fundamentals 1-3 • Windows Fundamentals 1-3 • Active Directory • Metasploit Suite • Wireshark • Nmap • Tcpdump • John the Ripper • CVE-2024-21413 • SOC Blue Team and more
📁 View Repository  


🛡️
Google

🔍 Google Cybersecurity Series (Verified Coursework)

  • Security Operations: Detection & Response, SIEM (Splunk/Chronicle), Incident Response.
  • Network Defense: Connect & Protect (TCP/IP, Firewalls, Network Security).
  • Risk Management: Play It Safe (NIST Framework, Threat Modeling).
  • Technical Skills: Linux Command Line and SQL (Tools of the Trade).

🛠️ Google IT Support Series

  • Technical Support Fundamentals: System Troubleshooting & Customer Success.
🏠
Home Lab

🏗️ Physical & Network Infrastructure

  • Custom Utility Routing: Engineered and executed a 60-foot main sewer and PEX water line installation.
  • Strategic Planning: Utilized custom tracking methods like reflective spray paint for precise utility mapping.
  • Hardware Integration: Specialized in out-of-the-box problem-solving for complex physical constraints.

💻 Virtual & Technical Environment

  • Network Segmentation: Configured secure zones for home-based technical projects.
  • Environment Management: Hands-on experience with hardware troubleshooting and system add-ons.
🛡️
Cyber Defense
Security Operations & Incident Response

   
🐧
Systems
Enterprise OS Administration & Active Directory

   
🌐
Networking
Packet Analysis & Network Traffic Monitoring

   
⚔️
Vulnerability
Ethical Hacking & Vulnerability Research

   
🔍
Tooling
Security Analysis & Cryptography

   

🛡️ Cyber Defense & SOC Operations

  • SOC Role in Blue Team: Understanding the workflow of a Security Operations Center.
  • Pre-Security Path: Completed foundational training in networking, Linux, and Windows.
  • Defensive Security: Introduction to incident response and digital forensics.
  • Cyber Kill Chain: Analyzing the stages of a cyberattack to improve detection.

🐧 Systems & Infrastructure

  • Linux Fundamentals (1, 2, 3): Mastered terminal navigation, permissions, and service management.
  • Windows Fundamentals (1, 2, 3): Deep dive into the Windows OS, registry, and UAC.
  • Active Directory Basics: Understanding domain controllers and network authentication.
  • Intro to Virtualization: Configuration and management of virtual environments.

🌐 Network Security & Traffic Analysis

  • Wireshark & Tcpdump: Hands-on packet capture and protocol analysis.
  • Nmap (The Basics & Live Room): Network scanning, port discovery, and service fingerprinting.
  • Networking Essentials: Mastered DNS, SMB, Telnet, and FTP secure configurations.
  • DNS in Detail: In-depth study of the Domain Name System and its vulnerabilities.

⚔️ Vulnerability Research & Exploitation

  • Blue (EternalBlue): Successfully exploited MS17-010 to understand critical OS flaws.
  • Ice (CVE-2014-4113): Executed privilege escalation via memory corruption vulnerabilities.
  • Kenobi: Exploited Samba for system enumeration and file system navigation.
  • Metasploit Suite: Comprehensive use of the framework for exploitation and post-exploitation.
  • Vulnerability Research: Identifying and analyzing CVEs for patch management.

🔍 Security Tooling & Cryptography

  • Burp Suite: Foundational web proxy analysis for security testing.
  • John the Ripper: Password cracking and cryptographic hash analysis.
  • Hashing Basics: Understanding data integrity and one-way encryption.
  • Public Key Cryptography: Implementing RSA and secure key exchange principles.





  

Onboard a pre-vetted Cybersecurity Analyst (Texarkana/Remote) through the OpenClassrooms state-approved apprenticeship program.

🔗 Strategic Talent: Why a Pre-Vetted Apprentice is a Day-One Asset

Business screenshot 2


💰 Financial Incentives
Access $6,000+ in hiring grants & tax credits.
🛠️ Tech Readiness
Trained in SOC/SIEM (TryHackMe/Forage certified).
🛡️ Data Integrity
Professional background at Wesco with security focus.
📈 High Production
4 days a week of work backed by cyber curriculum.

⚙️ Low Admin Lift
OpenClassrooms handles all compliance & mentorship.

  
Reach out via email to schedule a call






Popular repositories Loading

  1. BrandyHaynes-Cybertech BrandyHaynes-Cybertech Public

  2. Forage-Job-Simulations Forage-Job-Simulations Public

  3. TryHackMe-Hands-On-Training TryHackMe-Hands-On-Training Public

  4. Digital-Forensics-UMGC Digital-Forensics-UMGC Public

    Digital Forensics & Legal -Tech

  5. Cloud-Computing-UMGC Cloud-Computing-UMGC Public

    AWS Cloud Migration - VPC Architecture, EC2 deployment, & loud Vendor Analysis

  6. Healthcare-Cybersecurity-Network-Security-UMGC Healthcare-Cybersecurity-Network-Security-UMGC Public

    Healthcare cybersecurity coursework — IoMT CVE research, physical security planning, HIPAA/PII/PHI compliance training | UMGC CMIT 320