Michael Gammons, Cybersecurity Specialist

Entry-Level Cybersecurity Analyst CompTIA Security+ Certified Python & SOC Tools Enthusiast
 

817-715-1449

michael.g.cybersec@gmail.com

www.linkedin.com/in/michael-gammons-7469677b

As a recent cybersecurity bootcamp graduate and CompTIA Security+–certified professional, I specialize in penetration testing and ethical hacking. Proficient with nmap, Nessus, Kali Linux, Python and shell scripting, I apply core cybersecurity principles to identify, assess and remediate vulnerabilities. Driven by a passion for proactive defense, I partner with teams to safeguard critical assets and strengthen security postures.

 

Experience

October 2023 to October 2024 

School Director at Sage Truck Driving Schools

July 2021-October 2023

Regional Safety Manager

November 2019-July 2021

Small business owner at Gammons Woodcraft

Education

July 2025

Obtained CompTia Security + Certification 

May 2025 to July 2025

University of Texas at Arlington/Quick Start Cybersecurity Bootcamp

2014-2018

Brigham Young Univeristy-Idaho | Bachelor of Science in Marriage and Family Studies



Cybersecurity Projects


Vulnerability Assessments & Exploits Gallery
 

Executed comprehensive vulnerability assessments on Linux servers using Nmap in Kali Linux to enumerate services and identify exploitable targets. Leveraged Metasploit to establish root-level backdoors on two hosts, create privileged user accounts, and exfiltrate confidential files. Employed John the Ripper to crack password hashes and recover all user credentials, demonstrating full-cycle ethical hacking and post-exploitation proficiency.

PowerPoint presentation detailing the exploitation of two Linux servers: backdoor installation, root-privileged user creation, and extraction of hidden sensitive data.

Cybersecurity Capture-the-Flag Demonstration Session

Penetration Test Summary
Performed a full-cycle ethical hack against a Windows server using Kali Linux:
• Host enumeration via arp-scan to identify the target IP.
• Vulnerability reconnaissance with nmap to map open ports and services.
• Exploitation of discovered flaws using Metasploit, locating and capturing three hidden “flags.”
• Post-exploitation password cracking with John the Ripper to reveal all flag-protected credentials.

Demonstrates proficiency in network discovery, vulnerability assessment, advanced exploitation techniques, and cryptanalysis.


Network Connectivity Troubleshooting & Remediation

Leveraged Kali Linux to diagnose and resolve network connectivity issues on the CEO’s Linux workstation, utilizing nmap scanning, firewall configuration, and network control optimization.

Michael Gammons Cybersecurity Professional and Enthusiast.

© Copyright. All rights reserved.

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.