10+ years managing systems and solving problems. Now deploying infrastructure, learning Python and cybersecurity, with the goal of becoming a penetration tester and ethical hacker.
I bring a unique perspective: 10+ years of operations experience combined with growing cybersecurity expertise. My goal is to become a penetration tester and ethical hacker—securing systems by thinking like an attacker.
For over 10 years, I managed agricultural operations—troubleshooting equipment, leading teams, and solving complex problems under pressure. Now I'm applying that same hands-on approach to technology.
I've deployed and maintain a complete homelab infrastructure with 24 Docker services. I'm learning Python through practical projects. I understand Linux, networking, and security fundamentals.
What makes me different: I don't just know theory—I've built real systems that run 24/7. I've recovered from failures, optimized performance, and maintained production infrastructure. That's hands-on experience you can count on.
My goal is to transition into cybersecurity, specifically penetration testing and ethical hacking. I'm building the foundation through hands-on practice, certifications, and real-world security implementations.
Current Focus:
Why I'm a Good Fit for Security:
My operations background gives me a unique advantage—I understand how systems actually work in production, how they fail, and how to think like both a defender and an attacker. I approach security with a problem-solver's mindset and hands-on experience maintaining real infrastructure.
Vulnerable Applications & Security Practice | 2024-Present
Running intentionally vulnerable applications in isolated homelab environment for hands-on security testing and learning. Practicing penetration testing techniques, exploit development, and security assessments in a safe, controlled environment.
Applications: DVWA (Damn Vulnerable Web Application), WebGoat, Juice Shop, and other intentionally vulnerable targets for ethical hacking practice.
Learning: Web application vulnerabilities, OWASP Top 10, SQL injection, XSS, authentication bypass, privilege escalation, and security tool usage (Kali Linux, Burp Suite, nmap).
24 Docker Services | Raspberry Pi 4 | Production Environment
Deployed and maintain complete homelab infrastructure running 24/7. Includes Pi-hole blocking 101,000+ malicious domains daily, WireGuard VPN for secure remote access, comprehensive monitoring with Uptime Kuma and Grafana, and 19 additional services for automation and self-hosting.
Technologies: Docker, Linux (Ubuntu), Raspberry Pi, Pi-hole, WireGuard, Grafana, Prometheus, Portainer, UFW, Fail2Ban
Key Achievement: Maintained 99%+ uptime while recovering from major system failures independently.
Ongoing Self-Study | 2024-Present
Learning Python through hands-on projects and practical application. Building automation scripts, working with APIs, file processing, and data manipulation. Focus on solving real problems with code.
Approach: Learn by doing—not just tutorials. Build things that solve actual problems, break them, fix them, and understand how they work.