πΎ Welcome to My Portfolio!
Here, youβll find a showcase of my journey through the world of cybersecurity, including hands-on projects, professional experiences, certifications, and blog-style posts sharing my thoughts and learning experiences.
About Me | Projects | Resume | Blog
Table of Contents
π¨π½βπ» About Me
My name is Justin Goncalves, and I am a cybersecurity and IT professional with experience spanning network engineering, security operations, cloud security, and secure identity and endpoint management. My background in IT support, data analysis, and web development provides a strong technical foundation, while my current work in network engineering has strengthened my skills in system hardening, troubleshooting complex infrastructure issues, and maintaining secure, compliant environments across Microsoft 365, Active Directory, Intune, and more.
I am continually advancing my expertise and education in threat detection, vulnerability management, and incident response, applying a security-first mindset to both operational tasks and long-term infrastructure improvements. My approach blends hands-on troubleshooting with proactive security practices to protect critical systems and enhance organizational resilience.
For me, cybersecurity isnβt just a jobβitβs a chance to protect the future, make a meaningful impact, and contribute to a safer, more resilient digital world.
Get to know me a little better: More about me
Read my professional statement: Professional Statement
π Background
I began my career in pharmacy and healthcare, where I developed a strong foundation in helping people, solving problems, and working in high-responsibility environments. Over time, I found myself increasingly drawn to technologyβthe creativity, the complexity, and the ability to build solutions that could scale far beyond individual interactions. This curiosity led me into web development, where I gained hands-on experience designing systems, understanding user needs, and strengthening my technical mindset.
As I grew more comfortable in the world of technology, my focus shifted toward cybersecurity. The rise of cyber threats, fraud, and digital vulnerabilities sparked a desire to understand how systems fail and how they can be protected. What began as curiosity evolved into a dedicated pursuit, ultimately guiding me toward IT support, vulnerability management, network engineering, and defensive security practices.
Today, I combine my experience in IT, development, and security to protect infrastructure, strengthen identity and endpoint security, and contribute to safer digital environments. My journey reflects continuous growth, curiosity, and a commitment to defending the systems people rely on every day.
π Certifications
- GIAC GFACT (GIAC Foundational Cybersecurity Technologies)
- CompTIA Security+
- CompTIA Network+
- ISC2 Certified in Cybersecurity
- Google CyberSecurity Professional
- Qualys Vulnerability Management, Detection, and Response (VMDR)
- Qualys CyberSecurity Asset Management (CSAM)
- Qualys Vulnerability Management Scanning (VMS)
- United States Department of Homeland Security, National Incident Management System (NIMS)
- Incident Response & Command System Expertise
- IS-100.C: Introduction to Incident Command System (ICS-100)
- IS-200.C: Basic Incident Command System for Initial Response (ICS-200)
- IS-700.B: National Incident Management System (NIMS)
- IS-800.D: National Response Framework, An Introduction
- IS-2200: Basic Emergency Operations Center Functions
- Critical Infrastructure Security & Risk Management
- IS-860.C: National Infrastructure Protection Plan, An Introduction
- IS-906: Workplace Security Awareness
- IS-915: Protecting Critical Infrastructure Against Insider Threats
- IS-916: Critical Infrastructure Security: Theft and Diversion
- Disaster Recovery & Continuity Planning
- IS-230.E: Fundamentals of Emergency Management
- IS-2500: National Prevention Framework
- IS-1300.A: Introduction to Continuity
- Incident Response & Command System Expertise
π Education and Training
- SANS Technology Institute (Feb. 2025 - October 2025)
- Selected for a prestigious and intensive cybersecurity program with courses designed to provide hands-on experience in offensive and defensive security techniques.
- Anticipated completion of industry-leading certifications such as GIAC Security Foundations (GFACT), GIAC Security Essentials (GSEC), and GIAC Certified Incident Handler (GCIH).
- University of Massachusetts Dartmouth, North Dartmouth, MA (2019 - 2020, 2022-2023)
- Some education with a concentration in Finance and Financial Operations
- Completed coursework in _Business Statistics, Macro-Economics, Micro-Economics, Principles of Accounting, Operations Management, Financial Modeling, Investment Analysis, Financial Markets
- Boston Latin School, Boston, MA (2013 - 2019)
- High School Diploma
- Graduated from a prestigious exam school, ranked #1 in Massachusetts and 33rd nationally at the time of graduation.
π‘ Skills
π‘οΈ Technical Skills
- Endpoint Detection & Response (EDR)
- Incident Detection & Response
- Cloud and Enterprise Security
- Data Loss Prevention (DLP)
- Network Monitoring and Engineering
- Switch Configuration & Management (Aruba, Juniper)
- Group Policy Objects (GPO) Administration
- Zero Trust Architecture Principles
- Vulnerability Management
- Penetration Testing
- Network Security
- Threat Detection
- Cryptology
- Python Scripting
- Risk Assessment
- CIA Triad (Confidentiality, Integrity, Availability)
- Identity and Access Management (IAM)
- Authentication, Authorization, and Accounting (AAA)
- Governance, Risk, and Compliance (GRC):
- PCI DSS
- HIPAA
- GDPR
- ISO/IEC 27001
- NIMS (National Incident Management System)
- FEMA (Federal Emergency Management Agency)
- NIPP (National Infrastructure Protection Plan)
- SOC Type 1 / SOC Type 2
- FedRAMP
- Cybersecurity Frameworks:
- MITRE ATT&CK
- NIST (SP 800-53, SP 800-61, SP 800-171)
- OWASP Top 10
- CIS Controls
πΌ Professional Skills
- Technical Troubleshooting
- Root Cause Analysis
- Security Awareness Training
- Incident Response Leadership
- Critical Thinking
- Problem Solving
- Risk Assessment & Mitigation
- Ethical Decision Making
- Communication & Reporting
- Documentation & Presentation
π οΈ Tools/Languages
- Splunk
- Qualys
- Wireshark
- BurpSuite
- Metasploit
- Microsoft 365 Admin Center
- Active Directory,
- Microsoft Azure + Sentinel
- Linux
- Chronicle
- Python
- Git
- Suricata
- TCPDump
- SQL
π Projects
In this portfolio, you will find several projects that highlight my skills and practical experience. Here are a few of my most recent projects:
AIG Cybersecurity Engineering Program (September 2024)
- Completed work as an Information Security Analyst to address the critical Log4j vulnerability, analyzing advisory resources and infrastructure to draft a detailed remediation plan and advisory email for affected teams.
- Developed and executed a Python-based brute-force script to recover an encrypted file during a ransomware incident, demonstrating technical expertise in incident response and decryption methodologies.
Virtual Security Operations Center (SOC) Project (October 2024)
- Established a cloud-based SOC using Microsoft Azure, focusing on real-time monitoring and incident response over the course of a month, monitoring over 7.6 million events and generating nearly 6,000 alerts.
- Configured Microsoft Sentinel for real-time analysis and monitoring, setting up data connectors and custom alert rules while engaging with real-time security incidents to document responses and insights gained from the logs.
Telstra Cybersecurity Program (September 2024)
- Served as an Analyst and Security Engineer in the Telstra Security Operations Center (SOC), leading efforts to respond to malware attacks and implementing a custom Python script for a firewall rule to block malicious traffic.
- Analyzed firewall logs to detect malicious patterns and conducted postmortem analysis for root cause identification, improving overall system hardening.
Commonwealth Bank Intro to Cybersecurity Program (August 2024)
- Worked as a Cybersecurity Generalist on Commonwealth Bankβs Fraud Detection and Response Team, leveraging Splunk to analyze fraud patterns and manage phishing and malware incidents.
- Conducted penetration testing on web applications, identifying critical vulnerabilities and delivering remediation strategies.
More projects, labs, programs, and experiences will be added to my project portfolio as I continue to develop my skills and complete new work.
π Resume
My resume is available for download here
βπ½ Blog Posts
I regularly publish blog-style posts that dive into current cybersecurity trends, personal reflections on my learning process, and how Iβve applied theoretical knowledge to real-world problems. Stay tuned for insights on emerging cybersecurity threats, best practices, and more!
π¬ Contact Information
Feel free to reach out to me if you have any questions, opportunities, or just want to connect!
- Email:
- personal: justingoncalves34@gmail.com
- work: jgoncalves@sorbis.com
- LinkedIn: Justin Goncalves
- Portfolio: @justingoncalves
Iβm always open to networking, collaboration, and opportunities to contribute to the cybersecurity community. Thanks for visiting my portfolio!