
Michael Gammons, Cybersecurity Specialist
Entry-Level Cybersecurity Analyst CompTIA Security+ Certified Python & SOC Tools Enthusiast
817-715-1449
michael.g.cybersec@gmail.com
www.linkedin.com/in/michael-gammons-7469677b
As a recent cybersecurity bootcamp graduate and CompTIA Security+–certified professional, I specialize in penetration testing and ethical hacking. Proficient with nmap, Nessus, Kali Linux, Python and shell scripting, I apply core cybersecurity principles to identify, assess and remediate vulnerabilities. Driven by a passion for proactive defense, I partner with teams to safeguard critical assets and strengthen security postures.
Experience
October 2023 to October 2024
School Director at Sage Truck Driving Schools
July 2021-October 2023
Regional Safety Manager
November 2019-July 2021
Small business owner at Gammons Woodcraft
Education
July 2025
Obtained CompTia Security + Certification
May 2025 to July 2025
University of Texas at Arlington/Quick Start Cybersecurity Bootcamp
2014-2018
Brigham Young Univeristy-Idaho | Bachelor of Science in Marriage and Family Studies
Cybersecurity Projects
Vulnerability Assessments & Exploits Gallery
Executed comprehensive vulnerability assessments on Linux servers using Nmap in Kali Linux to enumerate services and identify exploitable targets. Leveraged Metasploit to establish root-level backdoors on two hosts, create privileged user accounts, and exfiltrate confidential files. Employed John the Ripper to crack password hashes and recover all user credentials, demonstrating full-cycle ethical hacking and post-exploitation proficiency.
PowerPoint presentation detailing the exploitation of two Linux servers: backdoor installation, root-privileged user creation, and extraction of hidden sensitive data.
Cybersecurity Capture-the-Flag Demonstration Session
Penetration Test Summary
Performed a full-cycle ethical hack against a Windows server using Kali Linux:
• Host enumeration via arp-scan to identify the target IP.
• Vulnerability reconnaissance with nmap to map open ports and services.
• Exploitation of discovered flaws using Metasploit, locating and capturing three hidden “flags.”
• Post-exploitation password cracking with John the Ripper to reveal all flag-protected credentials.
Demonstrates proficiency in network discovery, vulnerability assessment, advanced exploitation techniques, and cryptanalysis.
Network Connectivity Troubleshooting & Remediation
Leveraged Kali Linux to diagnose and resolve network connectivity issues on the CEO’s Linux workstation, utilizing nmap scanning, firewall configuration, and network control optimization.