Welcome to My Cybersecurity Journey

Hello, I'm Joseph LaCount, and I'm excited to share my cybersecurity journey with you. As a tech enthusiast and a dedicated learner, I've completed a comprehensive cybersecurity program, equipping me with a diverse skill set to navigate the ever-evolving world of information security. This portfolio serves as a showcase of my knowledge, accomplishments, and the projects I've worked on. I have a passion for cybersecurity, and I'm ready to apply my skills to safeguard the digital world. Explore my projects and experiences to get a glimpse of my capabilities and dedication to the field. Let's connect and explore the world of cybersecurity together!

Portfolio

Vulnerability Assessment Report

In my role, I conducted a vulnerability assessment on our e-commerce company's critical database server, focusing on access controls and guided by NIST SP 800-30 Rev. 1. The purpose was to identify potential risks and safeguard sensitive data, given the severe consequences of a breach. The assessment revealed various threats, including competitor-driven risks and potential cyberattacks, which we plan to address through the Principle of Least Privilege, a Defense in Depth strategy, Multi-Factor Authentication, and an Authentication, Authorization, Accounting (AAA) Framework. These measures are crucial for securing our valuable database server.

STAR Responses Worksheet

In this worksheet, I present three pivotal professional experiences that spotlight my cybersecurity competencies and effective response to security incidents. The first experience outlines my role as a Technology Professional Intern at Los Angeles County Internal Services Department, involving secure coding practices and digital support for a mentorship project. The second, as the proprietor of Grace Coding, demonstrates my proficiency in vulnerability assessments and security awareness. Finally, my role as a Digital Aide at Delete The Divide underscores my adeptness in incident response and threat intelligence.

Risk Register Sample Risk Matrix

In the operational environment of a coastal bank, where stringent financial regulations demand data and fund security, this risk register identifies potential risks to various assets, including funds, customer data, financial records, and physical security. These risks encompass scenarios such as business email compromise, user database compromise, and financial record leakage. The register assesses each risk's likelihood, severity, and priority, highlighting vulnerabilities within this unique operating context. This tool serves as a crucial instrument in proactively managing and mitigating potential security threats in a complex banking environment.

Algorithm For File Updates In Python

In this project, I developed a Python algorithm as part of my role as a security professional at a healthcare company. The algorithm manages a file containing a list of authorized employees' IP addresses for accessing sensitive patient records. By automatically cross-referencing this list with a "remove list" of IP addresses, it ensures that only authorized personnel have access to confidential patient data. This automation contributes to maintaining the security and privacy of healthcare information. The algorithm involves tasks such as reading and manipulating file contents and offers a practical solution for managing IP address access control in a healthcare setting.

PASTA Worksheet Portfolio

This portfolio item is based on the PASTA (Process for Attack Simulation and Threat Analysis) methodology. It encompasses multiple stages, including defining business and security objectives, evaluating technical scope, decomposing the application through a data flow diagram, conducting threat and vulnerability analyses, and creating an attack tree. The focus is on a sneaker company's application, emphasizing security considerations, technologies used, potential threats, vulnerabilities, and security controls to mitigate risks.

A little bit about me.

I'm Joseph LaCount, a passionate and results-driven technology enthusiast with a strong background in web development, IT support, and a deep commitment to cybersecurity. As a junior front-end web developer, I've honed my skills in creating engaging online experiences. Simultaneously, I've gathered practical IT support experience, fostering a comprehensive understanding of user needs and technical problem-solving. My journey has led me to operate my web design company, Grace Coding, where I've been crafting high-end web and graphic design solutions for clients from diverse industries.

Currently, I am enrolled in LACC taking coursework to obtain my AS in Cybersecurity with the intent to transfer to CSUSM to finish with s BS in Cybersecurity. I have successfully attained my Google Cybersecurity Certificate through Coursera, a valuable addition to my skill set that has equipped me with the tools to defend against digital threats. My experience extends to actively contributing to projects like Delete The Divide with ISD of Los Angeles County, advocating for digital equity, and offering IT support to the community. I've even ventured into the renewable energy sector as a Rework Technician, applying my IT and data analysis skills.

My core strengths include effective communication, problem-solving, and a strong penchant for collaboration. In every role, I strive to apply my skills for the betterment of projects and organizations. As an individual who is ever-curious and driven to contribute to the rapidly evolving world of cybersecurity, I'm excited to continue my journey by protecting digital assets and creating robust, secure online environments for organizations.

I am also a member of the HTCIA (High Technology Crime Investigation Association), a leading professional organization dedicated to investigations involving advanced technology.

Certifications and Badges