Hi there! I'm originally from Sydney, Australia, and came to the U.S. during high school as a dual citizen to pursue my dream of competing in Division 1 athletics. My college years as a student-athlete were unforgettable—I won 2 conference championships, earned 5 conference All-American awards, and even a second-team National All-American award. This experience instilled in me a strong sense of discipline, adaptability, and teamwork that have become the backbone of my journey in cloud and cybersecurity.
Outside of work, I love connecting with my community. I started a campus club called the "Cyber Young Network" to support fellow students in building their cyber and IT skills, I love to volunteer at my local church, and host a weekly Saturday Bible study with teammates and friends to foster connections with those around me. Whether in my career or in the community, I'm always looking to learn, share, and help others grow.
Gabriel Binion
San Antonio, TX 78249 US
+1 (480) 519-0929
Gabriel.Binion@my.utsa.edu
Conducted security monitoring and incident response for a network of over 3,000 endpoints, utilizing Cisco security tools including XDR, Stealthwatch, Secure Endpoint, Secure Cloud, ISE, and DNAC. Responsibilities encompassed malware analysis, alert triage, and remediation, along with detailed network traffic analysis to detect and mitigate threats. Collaborated with desk-side support for escalated tickets and occasionally provided cabling and troubleshooting support for IDF/MDFs to enhance network resilience and security.
Graduating with a Bachelors of Business Administration in Cybersecurity. Excelling in classes like Telecommunications and Networking, Information Assurance, Cyber Crime Investigations, Agile Project Management and Operating Systems Security.
Conducted 3 Splunk investigations. Investigated a malicious actor brute forcing accounts on the company website, Created alert counters using Suricata and FortiGate for the SIEM dashboards, Investigated malicious port and vulnerability scanning attempts by threat actors.
Performed internal vulnerability assessments with Nessus, identifying and exploiting an NFS vulnerability on the Metasploitable 2 server. Leveraged findings to deepen understanding of exploitation techniques and vulnerability remediation strategies.
Utilized Nmap commands to gather detailed information on target systems, identifying open ports, running services, and system vulnerabilities. Enhanced reconnaissance skills for improved security assessments and network analysis.
Applied SQL skills in a lab environment to filter critical data from a database, supporting a team’s investigation into security issues and facilitating timely computer updates for enhanced system security.