Skip to content
View DEBBKL's full-sized avatar

Block or report DEBBKL

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
DEBBKL/README.md

Déborah Loisel | Cybersecurity Analyst & Vulnerability Management

Codepen email LinkedIn


Windows Terminal HTML5 PowerShell OpenStack Gutenberg WordPress Adobe Photoshop Figma Canva Adobe Lightroom GitHub Git Cisco Prezi Splunk TOR Wireguard






github-snake



About Me

Junior cybersecurity professional specialized in vulnerability management, Blue Team operations, and incident response.
Experienced in Linux environments (Kali Linux, Ubuntu), security auditing, IDS/IPS (Snort, Wazuh), log analysis, and automation with Python and Bash.

Currently focused on developing practical skills aligned with OWASP methodologies, threat detection, and mitigation in real and virtual environments.
Based in Las Palmas de Gran Canaria, open to collaboration and professional opportunities.


Skills & Technologies

  • Operating Systems: Kali Linux, Ubuntu, Windows
  • Security Tools: Snort, Fail2Ban, Wazuh, Nessus, Burp Suite, ZAP Proxy, Nikto, Dirsearch, Nmap, Wireshark, Volatility, Suricata, Splunk
  • Scripting & Automation: Python (3.13), Bash, PowerShell
  • Cloud & DevOps: IONOS Cloud, Azure, Docker, GitHub Actions
  • CMS & Web Security: WordPress (Gutenberg, WooCommerce), Prestashop, WPvivid Backup
  • Version Control: Git & GitHub
  • Other Tools: SoftEther VPN, theZoo, Adobe Photoshop, Figma, Canva, Lightroom, TOR, Wireguard

Education & Certifications

  • SEPE – Cybersecurity Level 3
  • Fortinet NSE: FCF - Introduction to the Threat Landscape 3.0 — Score: 88/100 (June 2025)
    FCF Badge
  • Training in vulnerability analysis, IDS/IPS, log analysis, incident response, secure configurations, cryptography, and IT service management.
  • Bachelor’s Degree in Psychology (UNED, completed up to 3rd year) — strong foundation in social engineering and human factors in cybersecurity.

Professional Experience & Projects

  • Vulnerability management and technical security audits for corporate environments and cloud subdomains (using Nessus, ZAP, Burp Suite).
  • Development of automation scripts in Python and Bash for vulnerability scanning and reporting.
  • Incident detection and forensic analysis with Wireshark, Volatility, Snort, and Wazuh.
  • OWASP-based web security audits: HTTP header hardening, session security, access control.
  • Cloud and DevOps projects including containerization with Docker, CI/CD pipelines with GitHub Actions, and infrastructure management on IONOS and Azure.
  • Advanced WordPress administration: migrations, security optimization, WooCommerce customization, backup with WPvivid.
  • Documentation of incident response (IR) procedures, security checklists, and audit reports.

Practical Labs & Exercises

  • IDS/IPS Deployment & Configuration:
    Setup and tuning of Snort for intrusion detection on Kali Linux. Analysis of alerts and rule customization.

  • Log Analysis & Incident Response:
    Windows Event Viewer log review for security events. Monitoring and alerting configuration with Wazuh and Splunk.

  • Brute Force Attack Mitigation:
    Implementation of Fail2Ban to block SSH brute force attempts. Writing custom filters and testing with simulated attacks.

  • Vulnerability Scanning & Automation:
    Use of Nessus, OWASP ZAP, and Burp Suite for vulnerability discovery. Automated report generation using Python and Bash scripts.

  • Web Security Audits:
    Practical OWASP Top 10 audits including HTTP header security, session management, and access control tests.

  • Forensic Memory Analysis:
    Using Volatility framework for RAM analysis in incident investigation scenarios.

  • Cloud & DevOps Security:
    Hands-on experience with IONOS and Azure cloud environments, Docker container security, and GitHub Actions CI/CD workflows.

  • CMS Security:
    Hardening WordPress sites, plugin security reviews, backup strategies, and secure migrations.

  • Open Source Intelligence (OSINT):
    Installation and troubleshooting of X-OSINT tools on Kali Linux for threat intelligence gathering.


Featured Repositories

  • xosint-kali-blue-team
    Installation, troubleshooting, and detailed analysis of X-OSINT on Kali Linux. Includes installation scripts and documentation.

  • radare2-malware-analysis Repositorio técnico con el análisis estático completo del ransomware WannaCry usando Radare2 en Kali Linux. Incluye instalación paso a paso, ingeniería inversa, propuesta de reglas YARA y capturas explicativas.

  • (Upcoming) Blue Team practical labs: Windows event analysis, SSH hardening with Fail2Ban, brute force mitigation, log monitoring.


Core Competencies

  • Secure computer and network system configuration and auditing
  • Vulnerability detection and remediation aligned with OWASP standards
  • Intrusion detection with IDS/IPS (Snort, Wazuh)
  • Incident response and forensic analysis
  • Automation of security tasks using scripting languages
  • Cloud security fundamentals and DevOps best practices
  • User and access management, cryptography, secure protocols (TLS/SSL, VPN, SSH)
  • CMS hardening and security best practices

Location & Availability

Las Palmas de Gran Canaria, Spain.
Available for collaborations, internships, junior analyst roles, and cybersecurity projects.


Contact Me

Feel free to connect for professional opportunities, mentoring, or collaboration:
Email: [email protected]
LinkedIn: https://www.linkedin.com/in/deborahloisel/


"Security is a process, not a state."

Thank you for visiting my professional profile and training in Computer Security.

Pinned Loading

  1. vpn-ssh-configuracion-caso-practico vpn-ssh-configuracion-caso-practico Public

    Configuración práctica de acceso remoto seguro vía SSH entre Windows 11 y Kali Linux para distribución de archivos VPN a empleados. Proyecto documentado como parte de mi portfolio en ciberseguridad…

  2. blue-team-lab blue-team-lab Public

    Repositorio con casos prácticos de seguridad informática orientados a detección y respuesta ante incidentes (IDS con Snort), análisis de eventos en Windows 10, y mitigación de ataques por fuerza br…

    1

  3. DEBBKL DEBBKL Public

  4. powerbyte-ransomware-investigation powerbyte-ransomware-investigation Public

    Análisis forense de un caso práctico de ransomware interno simulado con John the Ripper. Recuperación de archivos críticos desde un archivo .rar protegido por contraseña.

    1

  5. xosint-kali-blue-team xosint-kali-blue-team Public

    Guía profesional para instalar y usar X-OSINT en Kali Linux, con resolución de errores y tips Blue Team.

    Shell 2

  6. radare2-malware-analysis radare2-malware-analysis Public

    Este repositorio documenta una práctica de análisis estático de malware. Se utiliza la herramienta Radare2 para analizar el ransomware WannaCry, extraído desde el repositorio theZoo. El objetivo es…

    Shell 1