
Where Cybersecurity and Networking Are Proven, Not Claimed
A professional cybersecurity portfolio focused on governance-first system design, validated technical work, and audit-ready documentation.


About
I focus on designing, implementing, and documenting cybersecurity and networking work that is defensible, repeatable, and aligned with real operational expectations.
My work emphasizes governance-first system design, deterministic execution, and clear authorization boundaries rather than ad-hoc automation or undocumented experimentation. Projects and labs are built to fail closed, preserve evidence integrity, and support auditability and review.
Alongside formal cybersecurity and networking education, I develop and document security analysis workflows, Linux-based tooling, network architectures, and structured lab environments. All work presented here is supported by reproducible configurations, written technical documentation, and version-controlled artifacts.
This portfolio reflects how I approach security and networking in practice: deliberate design, clear documentation, and decisions that can be reviewed, defended, and repeated.
Cybersecurity
This section documents cybersecurity work focused on security analysis, system visibility, and controlled validation of security controls within Linux-based and lab-driven environments. The emphasis is on understanding system behavior, data flow, and how security mechanisms perform under realistic conditions.
Work in this area includes analyzing network traffic, inspecting host and service behavior, and validating security controls through deliberate testing. Scenarios are designed to reflect enterprise-style environments, prioritizing traceability, repeatability, and defensible outcomes rather than isolated exercises.
All cybersecurity work presented here is supported by documented labs, configuration artifacts, and technical write-ups maintained in GitHub repositories. The objective is to demonstrate applied security reasoning, disciplined execution, and evidence-backed analysis, not theoretical discussion or tool-centric claims.
Network Architecture
-
Focused on designing and validating structured, segmented networks that balance performance, security, and operational visibility across enterprise-style environments.
-
Covers routing and switching fundamentals, VLAN segmentation, inter-VLAN routing, and firewall-aware network design rather than flat or simplified topologies.
-
Architectures are built and tested in controlled lab environments to validate routing behavior, segmentation boundaries, and traffic flow between security zones.
-
Emphasizes how architectural decisions directly affect security posture, fault isolation, blast-radius containment, and incident response clarity.
-
All environments are documented and iterated to demonstrate how secure, scalable networks are planned, implemented, tested, and evaluated in practice.

Cybersecurity Analysis
-
Focused on understanding system behavior under both normal and abnormal conditions, identifying weaknesses, and validating security controls through direct observation and controlled testing.
-
Emphasizes deep visibility across networks and hosts using Linux-based tooling to inspect traffic, review system activity, and analyze indicators of compromise.
-
Conducted within controlled lab environments designed to mirror real-world enterprise scenarios, not isolated or synthetic exercises.
-
Reflects SOC-aligned workflows where evidence, contextual analysis, and verification drive decisions rather than assumptions or automated conclusions.

Technical Labs & Documentation
-
All cybersecurity and networking work presented is backed by documented technical labs and reproducible configurations.
-
Each lab is designed with a clear objective, executed step-by-step, and validated through direct testing and observation.
-
Documentation emphasizes accuracy, repeatability, and traceability, ensuring configurations, results, and decisions can be independently reviewed and defended.
-
Lab environments are structured to reflect enterprise-style scenarios, not isolated or theoretical exercises.
-
This approach aligns with professional expectations for technical reporting, auditability, and knowledge transfer.
-
Detailed walkthroughs, configurations, and supporting evidence are maintained in GitHub repositories:
View lab documentation →
Security Controls & Validation
Implementation and validation of firewall rules and access controls within controlled lab environments. Focuses on enforcing segmentation boundaries, restricting unauthorized traffic, and confirming security policy behavior through observed outcomes.

Outbound Firewall Policies (ENG / FIN / HR → WAN)
Fortinet firewall rules enforcing outbound access control with NAT enabled across segmented VLANs.
Network Architecture & Segmentation
Design and validation of segmented network environments using VLANs, routing, and firewall-aware layouts. Focuses on traffic flow control, isolation boundaries, and the security impact of architectural decisions.

TCP Three-Way Handshake Analysis — Filtered Wireshark capture demonstrating Layer 4 connection establishment and protocol inspection.

Packet-level inspection and analysis of Layer 2–7 traffic using Wireshark. Focuses on identifying normal versus anomalous behavior, validating protocol operation, and extracting evidence from live captures using precise filtering and decoding.
Network Traffic Analysis

Security Approach
My security work is grounded in governance-first design, deterministic execution, and audit-ready systems. I focus on building security workflows that enforce explicit authorization boundaries, fail-closed behavior, and verifiable evidence lineage rather than opaque automation or heuristic conclusions.
This approach is being implemented by me as the sole designer and engineer of Trinity Cipher, a security platform currently in active development that formalizes task execution, approvals, audit logging, and reproducible reporting. The project reflects how security systems must operate in real environments: controlled, explainable, and accountable by design.
A full technical implementation document is available for engineering-level review.
Technical documentation available upon request.
Email: gregory@trinitysystems.ca




