About Me

Hi! I’m a 33-year-old father of three amazing kids, and I live with my partner. Right now, I’m in my third year of studying towards my HND in Cyber Security, and I’m planning to continue my journey at Abertay University next year to study Computer Science and Cyber Security.

Cybersecurity isn’t just a career path for me-it’s something I genuinely love. I have a deep passion for learning how systems work, discovering new tools, and finding ways to automate tasks to make things more efficient and secure. Whether I’m experimenting with tools in my home lab, digging into Hack The Box or TryHackMe activities, or scripting something from scratch, I’m always looking for that “aha” moment that comes when everything clicks.

Due to college work, competitions, and events, I don’t always have as much time for platforms like Hack The Box and TryHackMe as I’d like, but I always come back to them when I can. I’ve been lucky to be involved in some great challenges-like being a Cyber Leaders Challenge finalist at the BT Tower in London, and a semi-finalist at the Cyber 9/12 Strategy Challenge, where I worked with a fantastic team to respond to a simulated national cyber crisis. These experiences have pushed me outside of my comfort zone, helped me build confidence, and shown me just how much I enjoy solving problems under pressure.

I’m also a regular at cybersecurity events and forums, including SECURI-Tay and Hack Glasgow, where I stay up to date with new ideas, tools, and real-world industry challenges. Being around other passionate people always gives me a boost and inspires me to keep going.

I’m a fast learner who loves taking on new challenges, whether in a team or working independently. Deadlines are important to me, and even when things get hectic, I push myself to deliver my best. Balancing study, competitions, and family life isn’t always easy, but my family means the world to me and their support keeps me grounded and motivated.

This field keeps evolving, and that’s what I love most about it-there’s always more to learn, and I’m excited to see where this journey takes me next.

Skills

Kali Linux & Penetration Testing
Experienced in using Kali Linux for penetration testing in controlled environments. Practical applications include:

  • Metasploit: Conducted penetration tests to exploit vulnerabilities and test system defences.
  • Nmap: Mapped network structures, scanned for open ports, and analysed vulnerabilities.
  • Nessus: Ran vulnerability scans, identified misconfigurations, and provided actionable security recommendations.
  • Snort: Set up and fine-tuned intrusion detection system (IDS) rules to monitor traffic and detect attacks.
  • Wireshark: Captured and analysed network packets to diagnose issues and identify suspicious activities.
  • Metasploitable: Practiced exploiting vulnerabilities in a virtualized environment to understand system weaknesses and mitigation techniques.

Windows & Windows 365
Proficient in configuring and managing Windows systems and Windows 365 virtual desktops. Practical tasks included:

  • Setting up Windows Server with DHCP and DNS servers to provide seamless network management.
  • Managing user accounts and permissions in Active Directory, including creating specific user groups with tailored privileges to enforce access controls.
  • Deploying group policies to regulate security settings and streamline administrative tasks.

Firewall Configuration
Designed and implemented firewalls for enhanced security. Developed custom rules to:

  • Control traffic using blacklists and whitelists to allow or block specific IPs and services.
  • Create application-specific rules for secure data flow.
  • Harden wireless networks by implementing WPA3 encryption, isolating guest networks, and preventing rogue access points.

Digital Forensics
Skilled in digital forensics tools and methodologies:

  • FTK Imager: Created forensic images of storage devices, ensuring integrity for evidence collection.
  • Autopsy: Conducted file recovery and artifact analysis, identifying key evidence from drives.
  • USB Write Protect: Ensured data integrity by preventing accidental or malicious changes during analysis.
  • Audriller: Extracted and analysed data from mobile devices for investigation purposes.

Programming & Scripting

  • Python: Automated tasks, such as log analysis and vulnerability scanning, to streamline cybersecurity workflows.
  • C++: Developed programs to simulate and counteract potential attacks.
  • Java: Built security tools and basic applications for cross-platform deployment.
  • HTML, CSS, JavaScript: Designed and developed secure webpages..

Web Development
Created secure and functional web pages, integrating JavaScript for interactive elements and building interfaces to manage firewall configurations and security dashboards.

Wireless Network Security
Proficient in designing and securing wireless networks by:

  • Configuring advanced encryption (WPA3) and hiding SSIDs to enhance security.
  • Implementing VLANs for network segmentation.
  • Setting up blacklists and whitelists to control device access.

Legislation & Standards
In-depth knowledge of key cybersecurity regulations and standards:

  • General Data Protection Regulation (GDPR): Ensured data privacy and compliance in security tasks.
  • Computer Misuse Act: Conducted ethical tests within legal boundaries.
  • ISO/IEC 27001: Applied information security management practices to protect sensitive data.
  • Data Protection Act (DPA): Maintained adherence to data security standards during investigations.

Education

Higher National Diploma (HND) in Cyber Security - Dundee and Angus College

 August 2024 - May 2025 | Modules Covered :

  • Routing Technology | FR2235
  • Cyber Security | GP8316
  • Object Oriented Programming | H17135
  • Intrusion Prevention Systems | H17M34
  • Social Engineering | J0HF34
  • Computer Operating Systems | J11W35
  • Digital Forensics | J27M35
  • Server Administration for Cyber Security | J27P35
  • Wireless Device Security | J27R35
  • Working in Cyber Security | J27S34
  • Cyber Security: Graded Unit 2 | J2JN35
  • Skills for Lifelong Learning | Z0SLL01
  • Cisco Sem 2 | FR2235

Higher National Certificate (HNC) in Cyber Security - Dundee and Angus College

 August 2023 - May 2024 | Modules Covered :

  • Cyber Security: Graded Unit 1 passed with Grade A
  • Ethical Hacking | J0HK34
  • Penetration Testing | J0HB34
  • Computer Architecture J0J834
  • Computer Networking Concepts, Practice | J0HJ34
  • Software Development | J0HA34
  • Data Security | J0H934
  • Digital Forensics | J0HL34
  • Professionalism and Ethics Cyber Security | J0HH34
  • Scripting for Security | J0HD34
  • Cisco Sem 1
  • IOT and Team Working in Cyber
  • Networking Technology | FR2435
  • Computer Programming | J0HA34
  • Internet of Things | J0HC34
  • Team Working in Computing | H17834

Certificate in Computer Technology with Cyber Security - Dundee and Angus College

 August 2022 - May 2023 | Subjects Covered :

  • Web Development
  • Maths for Computing
  • Project
  • Hardware and Networking
  • Ethical Hacking
  • Introduction to Linux

Certificates

Work Experience

SupervisorRavensby Glass Manufacturing
In this role, I developed strong leadership and teamwork skills, leading a production team to meet deadlines and maintain quality. I was responsible for troubleshooting technical issues, which involved working with new technologies and learning software essential for running production systems. This experience strengthened my ability to handle pressure and solve problems quickly, which is critical in cybersecurity when responding to threats or managing incidents.

Key Skills:

  • Team management and leadership
  • Problem-solving and troubleshooting
  • Working with technology and software
  • Meeting strict deadlines under pressure

 

Van DriverWing Fung Ltd. (Cash & Carry Company)
While delivering goods and interacting with customers, I honed my customer service and communication skills. I frequently had to address customer concerns and resolve issues on the spot, similar to how cybersecurity professionals interact with clients to solve security problems. Handling payments and sensitive data in this role also emphasized the importance of trust and security in day-to-day operations.

Key Skills:

  • Customer service and communication
  • Problem-solving in real-time
  • Handling sensitive information securely
  • Building and maintaining trust with clients

Contact Me

This field is required.

This field is required.

I hereby agree that this data will be stored and processed for the purpose of establishing contact. I am aware that I can revoke my consent at any time.*

This field is required.

* Indicates required fields
Message could not be sent. Please try again later.
Message was successfully sent

 Your next great hire might be just a click away!

©Copyright. 

Guntis Subrovskis

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.