Junior cybersecurity professional specialized in vulnerability management, Blue Team operations, and incident response.
Experienced in Linux environments (Kali Linux, Ubuntu), security auditing, IDS/IPS (Snort, Wazuh), log analysis, and automation with Python and Bash.
Currently focused on developing practical skills aligned with OWASP methodologies, threat detection, and mitigation in real and virtual environments.
Based in Las Palmas de Gran Canaria, open to collaboration and professional opportunities.
- Operating Systems: Kali Linux, Ubuntu, Windows
- Security Tools: Snort, Fail2Ban, Wazuh, Nessus, Burp Suite, ZAP Proxy, Nikto, Dirsearch, Nmap, Wireshark, Volatility, Suricata, Splunk
- Scripting & Automation: Python (3.13), Bash, PowerShell
- Cloud & DevOps: IONOS Cloud, Azure, Docker, GitHub Actions
- CMS & Web Security: WordPress (Gutenberg, WooCommerce), Prestashop, WPvivid Backup
- Version Control: Git & GitHub
- Other Tools: SoftEther VPN, theZoo, Adobe Photoshop, Figma, Canva, Lightroom, TOR, Wireguard
- SEPE – Cybersecurity Level 3
- Fortinet NSE: FCF - Introduction to the Threat Landscape 3.0 — Score: 88/100 (June 2025)
- Training in vulnerability analysis, IDS/IPS, log analysis, incident response, secure configurations, cryptography, and IT service management.
- Bachelor’s Degree in Psychology (UNED, completed up to 3rd year) — strong foundation in social engineering and human factors in cybersecurity.
- Vulnerability management and technical security audits for corporate environments and cloud subdomains (using Nessus, ZAP, Burp Suite).
- Development of automation scripts in Python and Bash for vulnerability scanning and reporting.
- Incident detection and forensic analysis with Wireshark, Volatility, Snort, and Wazuh.
- OWASP-based web security audits: HTTP header hardening, session security, access control.
- Cloud and DevOps projects including containerization with Docker, CI/CD pipelines with GitHub Actions, and infrastructure management on IONOS and Azure.
- Advanced WordPress administration: migrations, security optimization, WooCommerce customization, backup with WPvivid.
- Documentation of incident response (IR) procedures, security checklists, and audit reports.
-
IDS/IPS Deployment & Configuration:
Setup and tuning of Snort for intrusion detection on Kali Linux. Analysis of alerts and rule customization. -
Log Analysis & Incident Response:
Windows Event Viewer log review for security events. Monitoring and alerting configuration with Wazuh and Splunk. -
Brute Force Attack Mitigation:
Implementation of Fail2Ban to block SSH brute force attempts. Writing custom filters and testing with simulated attacks. -
Vulnerability Scanning & Automation:
Use of Nessus, OWASP ZAP, and Burp Suite for vulnerability discovery. Automated report generation using Python and Bash scripts. -
Web Security Audits:
Practical OWASP Top 10 audits including HTTP header security, session management, and access control tests. -
Forensic Memory Analysis:
Using Volatility framework for RAM analysis in incident investigation scenarios. -
Cloud & DevOps Security:
Hands-on experience with IONOS and Azure cloud environments, Docker container security, and GitHub Actions CI/CD workflows. -
CMS Security:
Hardening WordPress sites, plugin security reviews, backup strategies, and secure migrations. -
Open Source Intelligence (OSINT):
Installation and troubleshooting of X-OSINT tools on Kali Linux for threat intelligence gathering.
-
xosint-kali-blue-team
Installation, troubleshooting, and detailed analysis of X-OSINT on Kali Linux. Includes installation scripts and documentation. -
radare2-malware-analysis Repositorio técnico con el análisis estático completo del ransomware WannaCry usando Radare2 en Kali Linux. Incluye instalación paso a paso, ingeniería inversa, propuesta de reglas YARA y capturas explicativas.
-
(Upcoming) Blue Team practical labs: Windows event analysis, SSH hardening with Fail2Ban, brute force mitigation, log monitoring.
- Secure computer and network system configuration and auditing
- Vulnerability detection and remediation aligned with OWASP standards
- Intrusion detection with IDS/IPS (Snort, Wazuh)
- Incident response and forensic analysis
- Automation of security tasks using scripting languages
- Cloud security fundamentals and DevOps best practices
- User and access management, cryptography, secure protocols (TLS/SSL, VPN, SSH)
- CMS hardening and security best practices
Las Palmas de Gran Canaria, Spain.
Available for collaborations, internships, junior analyst roles, and cybersecurity projects.
Feel free to connect for professional opportunities, mentoring, or collaboration:
Email: [email protected]
LinkedIn: https://www.linkedin.com/in/deborahloisel/
"Security is a process, not a state."
Thank you for visiting my professional profile and training in Computer Security.