About Me

Chazztin Pascual,

I'm a Bay Area native, born in San Francisco, CA, and spent part of my formative years at St. Mary's International School, a boarding school in Japan. Later, I pursued my college education at UC Berkeley before living in Los Angeles for a few years

I have over a decade of experience in the tech industry. Growing up in the Silicon Valley has deepened my passion for computers and technology. I take pride in my Bay Area roots; the region's rich history and its vibrant community have shaped who I am today.

Earlier this year, I married a wonderful woman, my wife Trinity Pascual. We are expecting our first child this August and are excited to experience parenthood for the first time.

The Skills I offer to your Business

1. Threat Detection and Mitigation

  • Configured and managed Security Information and Event Management (SIEM) tools such as Splunk, IBM QRadar, or LogRhythm for real-time monitoring and threat analysis.
  • Developed and deployed Intrusion Detection and Prevention Systems (IDS/IPS) to identify and block malicious activities.
  • Conducted threat intelligence gathering to identify emerging vulnerabilities and adjust security controls proactively.

2. Vulnerability Management

  • Performed regular vulnerability assessments using tools like Nessus, Qualys, and OpenVAS.
  • Conducted penetration testing with Kali Linux, Metasploit, and Burp Suite to identify and remediate potential security flaws.
  • Implemented patch management processes to address system vulnerabilities.

3. Incident Response

  • Led incident response efforts by investigating, containing, and mitigating security incidents.
  • Conducted forensic analysis of breaches using tools like EnCase, FTK, and Autopsy.
  • Developed and maintained incident response playbooks for common threats, including ransomware and phishing attacks.

4. Network and Endpoint Security

  • Secured enterprise networks by configuring firewalls (e.g., Palo Alto, Cisco ASA) and VPNs to prevent unauthorized access.
  • Deployed endpoint protection solutions such as CrowdStrike, Symantec, or Carbon Black to safeguard devices against malware and ransomware.
  • Configured and maintained secure email gateways (SEG) to prevent phishing and spam attacks.

5. Security Architecture and Frameworks

  • Designed and implemented multi-layered security architectures, including Zero Trust and defense-in-depth strategies.
  • Conducted risk assessments and applied security controls following frameworks like NIST CSF, ISO 27001, and CIS Controls.
  • Hardened systems by applying secure configurations to servers, endpoints, and network devices.

6. Identity and Access Management (IAM)

  • Implemented IAM solutions such as Okta, Azure AD, or CyberArk to enforce strong authentication and least privilege principles.
  • Configured multi-factor authentication (MFA) for critical systems to reduce unauthorized access risks.
  • Performed regular audits of user access rights to ensure compliance with organizational policies.

7. Cloud Security

  • Secured cloud environments in AWS, Azure, and Google Cloud by applying identity policies, encryption, and monitoring tools.
  • Configured cloud-native security services like AWS GuardDuty, Azure Security Center, and Google Chronicle.
  • Ensured compliance with shared responsibility models and secured workloads in hybrid cloud environments.

8. Compliance and Governance

  • Ensured compliance with regulations such as GDPR, PCI DSS, HIPAA, and CCPA by implementing appropriate controls and generating audit reports.
  • Developed and maintained cybersecurity policies, including acceptable use policies (AUP) and incident response plans.
  • Conducted security awareness training programs for employees to reduce human risk factors.

9. Automation and Scripting

  • Automated routine security tasks using Python, Bash, or PowerShell scripts.
  • Integrated automated workflows in incident response processes using SOAR tools like Palo Alto Cortex XSOAR or Splunk Phantom.
  • Developed custom scripts for log parsing, vulnerability scanning, and alerting.

10. Cybersecurity Tools and Technologies

  • Proficient in:
    • Network Security: Wireshark, TCPDump, Snort
    • Endpoint Security: McAfee, Trend Micro, SentinelOne
    • Vulnerability Scanners: Nessus, OpenVAS, Qualys
    • Penetration Testing Tools: Metasploit, Nmap, Hydra
    • Forensics: EnCase, FTK, Autopsy
    • SIEM: Splunk, QRadar, Elastic Stack
    • Cloud Security: AWS IAM, Azure Defender, Google Security Command Center