About Me
Chazztin Pascual,
I'm a Bay Area native, born in San Francisco, CA, and spent part of my formative years at St. Mary's International School, a boarding school in Japan. Later, I pursued my college education at UC Berkeley before living in Los Angeles for a few years
I have over a decade of experience in the tech industry. Growing up in the Silicon Valley has deepened my passion for computers and technology. I take pride in my Bay Area roots; the region's rich history and its vibrant community have shaped who I am today.
Earlier this year, I married a wonderful woman, my wife Trinity Pascual. We are expecting our first child this August and are excited to experience parenthood for the first time.
The Skills I offer to your Business
1. Threat Detection and Mitigation
- Configured and managed Security Information and Event Management (SIEM) tools such as Splunk, IBM QRadar, or LogRhythm for real-time monitoring and threat analysis.
- Developed and deployed Intrusion Detection and Prevention Systems (IDS/IPS) to identify and block malicious activities.
- Conducted threat intelligence gathering to identify emerging vulnerabilities and adjust security controls proactively.
2. Vulnerability Management
- Performed regular vulnerability assessments using tools like Nessus, Qualys, and OpenVAS.
- Conducted penetration testing with Kali Linux, Metasploit, and Burp Suite to identify and remediate potential security flaws.
- Implemented patch management processes to address system vulnerabilities.
3. Incident Response
- Led incident response efforts by investigating, containing, and mitigating security incidents.
- Conducted forensic analysis of breaches using tools like EnCase, FTK, and Autopsy.
- Developed and maintained incident response playbooks for common threats, including ransomware and phishing attacks.
4. Network and Endpoint Security
- Secured enterprise networks by configuring firewalls (e.g., Palo Alto, Cisco ASA) and VPNs to prevent unauthorized access.
- Deployed endpoint protection solutions such as CrowdStrike, Symantec, or Carbon Black to safeguard devices against malware and ransomware.
- Configured and maintained secure email gateways (SEG) to prevent phishing and spam attacks.
5. Security Architecture and Frameworks
- Designed and implemented multi-layered security architectures, including Zero Trust and defense-in-depth strategies.
- Conducted risk assessments and applied security controls following frameworks like NIST CSF, ISO 27001, and CIS Controls.
- Hardened systems by applying secure configurations to servers, endpoints, and network devices.
6. Identity and Access Management (IAM)
- Implemented IAM solutions such as Okta, Azure AD, or CyberArk to enforce strong authentication and least privilege principles.
- Configured multi-factor authentication (MFA) for critical systems to reduce unauthorized access risks.
- Performed regular audits of user access rights to ensure compliance with organizational policies.
7. Cloud Security
- Secured cloud environments in AWS, Azure, and Google Cloud by applying identity policies, encryption, and monitoring tools.
- Configured cloud-native security services like AWS GuardDuty, Azure Security Center, and Google Chronicle.
- Ensured compliance with shared responsibility models and secured workloads in hybrid cloud environments.
8. Compliance and Governance
- Ensured compliance with regulations such as GDPR, PCI DSS, HIPAA, and CCPA by implementing appropriate controls and generating audit reports.
- Developed and maintained cybersecurity policies, including acceptable use policies (AUP) and incident response plans.
- Conducted security awareness training programs for employees to reduce human risk factors.
9. Automation and Scripting
- Automated routine security tasks using Python, Bash, or PowerShell scripts.
- Integrated automated workflows in incident response processes using SOAR tools like Palo Alto Cortex XSOAR or Splunk Phantom.
- Developed custom scripts for log parsing, vulnerability scanning, and alerting.
10. Cybersecurity Tools and Technologies
- Proficient in:
- Network Security: Wireshark, TCPDump, Snort
- Endpoint Security: McAfee, Trend Micro, SentinelOne
- Vulnerability Scanners: Nessus, OpenVAS, Qualys
- Penetration Testing Tools: Metasploit, Nmap, Hydra
- Forensics: EnCase, FTK, Autopsy
- SIEM: Splunk, QRadar, Elastic Stack
- Cloud Security: AWS IAM, Azure Defender, Google Security Command Center