About Me

I am 33 years old, a father of three amazing kids, and I live with my partner. I am currently in my third year of studying and working towards my HND. My goal is to move on to university next year.

I have a big passion for cybersecurity. I love discovering new tools, testing them, and finding ways to make tasks automated. It gives me so much satisfaction when I solve problems or finish something that improves security.

Deadlines are very important to me. I always try my best to meet them, no matter how hard or busy things get. Studying takes up a lot of my time, and it’s not easy to balance everything, but I always make an effort to spend as much time as I can with my family. They mean everything to me, and their support keeps me going.

Cybersecurity is not just a career for me; it’s something I truly enjoy. I want to keep learning and improving, and I can’t wait to see where this journey takes me.

Skills

Kali Linux & Penetration Testing
Experienced in using Kali Linux for penetration testing in controlled environments. Practical applications include:

  • Metasploit: Conducted penetration tests to exploit vulnerabilities and test system defences.
  • Nmap: Mapped network structures, scanned for open ports, and analysed vulnerabilities.
  • Nessus: Ran vulnerability scans, identified misconfigurations, and provided actionable security recommendations.
  • Snort: Set up and fine-tuned intrusion detection system (IDS) rules to monitor traffic and detect attacks.
  • Wireshark: Captured and analysed network packets to diagnose issues and identify suspicious activities.
  • Metasploitable: Practiced exploiting vulnerabilities in a virtualized environment to understand system weaknesses and mitigation techniques.

Windows & Windows 365
Proficient in configuring and managing Windows systems and Windows 365 virtual desktops. Practical tasks included:

  • Setting up Windows Server with DHCP and DNS servers to provide seamless network management.
  • Managing user accounts and permissions in Active Directory, including creating specific user groups with tailored privileges to enforce access controls.
  • Deploying group policies to regulate security settings and streamline administrative tasks.

Firewall Configuration
Designed and implemented firewalls for enhanced security. Developed custom rules to:

  • Control traffic using blacklists and whitelists to allow or block specific IPs and services.
  • Create application-specific rules for secure data flow.
  • Harden wireless networks by implementing WPA3 encryption, isolating guest networks, and preventing rogue access points.

Digital Forensics
Skilled in digital forensics tools and methodologies:

  • FTK Imager: Created forensic images of storage devices, ensuring integrity for evidence collection.
  • Autopsy: Conducted file recovery and artifact analysis, identifying key evidence from drives.
  • USB Write Protect: Ensured data integrity by preventing accidental or malicious changes during analysis.
  • Audriller: Extracted and analysed data from mobile devices for investigation purposes.

Programming & Scripting

  • Python: Automated tasks, such as log analysis and vulnerability scanning, to streamline cybersecurity workflows.
  • C++: Developed programs to simulate and counteract potential attacks.
  • Java: Built security tools and basic applications for cross-platform deployment.
  • HTML, CSS, JavaScript: Designed and developed secure webpages..

Web Development
Created secure and functional web pages, integrating JavaScript for interactive elements and building interfaces to manage firewall configurations and security dashboards.

Wireless Network Security
Proficient in designing and securing wireless networks by:

  • Configuring advanced encryption (WPA3) and hiding SSIDs to enhance security.
  • Implementing VLANs for network segmentation.
  • Setting up blacklists and whitelists to control device access.

Legislation & Standards
In-depth knowledge of key cybersecurity regulations and standards:

  • General Data Protection Regulation (GDPR): Ensured data privacy and compliance in security tasks.
  • Computer Misuse Act: Conducted ethical tests within legal boundaries.
  • ISO/IEC 27001: Applied information security management practices to protect sensitive data.
  • Data Protection Act (DPA): Maintained adherence to data security standards during investigations.

Education

Higher National Diploma (HND) in Cyber Security - Dundee and Angus College

 August 2024 - May 2025 | Modules Covered :

  • Routing Technology | FR2235
  • Cyber Security | GP8316
  • Object Oriented Programming | H17135
  • Intrusion Prevention Systems | H17M34
  • Social Engineering | J0HF34
  • Computer Operating Systems | J11W35
  • Digital Forensics | J27M35
  • Server Administration for Cyber Security | J27P35
  • Wireless Device Security | J27R35
  • Working in Cyber Security | J27S34
  • Cyber Security: Graded Unit 2 | J2JN35
  • Skills for Lifelong Learning | Z0SLL01
  • Cisco Sem 2 | FR2235

Higher National Certificate (HNC) in Cyber Security - Dundee and Angus College

 August 2023 - May 2024 | Modules Covered :

  • Cyber Security: Graded Unit 1 passed with Grade A
  • Ethical Hacking | J0HK34
  • Penetration Testing | J0HB34
  • Computer Architecture J0J834
  • Computer Networking Concepts, Practice | J0HJ34
  • Software Development | J0HA34
  • Data Security | J0H934
  • Digital Forensics | J0HL34
  • Professionalism and Ethics Cyber Security | J0HH34
  • Scripting for Security | J0HD34
  • Cisco Sem 1
  • IOT and Team Working in Cyber
  • Networking Technology | FR2435
  • Computer Programming | J0HA34
  • Internet of Things | J0HC34
  • Team Working in Computing | H17834

Certificate in Computer Technology with Cyber Security - Dundee and Angus College

 August 2022 - May 2023 | Subjects Covered :

  • Web Development
  • Maths for Computing
  • Project
  • Hardware and Networking
  • Ethical Hacking
  • Introduction to Linux

Certificates

Work Experience

Supervisor — Ravensby Glass Manufacturing
In this role, I developed strong leadership and teamwork skills, leading a production team to meet deadlines and maintain quality. I was responsible for troubleshooting technical issues, which involved working with new technologies and learning software essential for running production systems. This experience strengthened my ability to handle pressure and solve problems quickly, which is critical in cybersecurity when responding to threats or managing incidents.

Key Skills:

  • Team management and leadership
  • Problem-solving and troubleshooting
  • Working with technology and software
  • Meeting strict deadlines under pressure

 

Van Driver — Wing Fung Ltd. (Cash & Carry Company)
While delivering goods and interacting with customers, I honed my customer service and communication skills. I frequently had to address customer concerns and resolve issues on the spot, similar to how cybersecurity professionals interact with clients to solve security problems. Handling payments and sensitive data in this role also emphasized the importance of trust and security in day-to-day operations.

Key Skills:

  • Customer service and communication
  • Problem-solving in real-time
  • Handling sensitive information securely
  • Building and maintaining trust with clients

Contact Me

This field is required.

This field is required.

I hereby agree that this data will be stored and processed for the purpose of establishing contact. I am aware that I can revoke my consent at any time.*

This field is required.

* Indicates required fields
Message could not be sent. Please try again later.
Message was successfully sent

                  Curious to Learn More?                   your next great hire might be just a click away!

©Copyright. Guntis Subrovskis

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.