Tyler Burke - IT & Cybersecurity Professional

Tyler Burke's Portfolio.

IT & Cybersecurity Professional

About Me

Results-driven cybersecurity and IT professional with a background in threat detection, risk analysis, and open-source intelligence. Former U.S. Army Intelligence Analyst currently pursuing a Bachelor's Degree in Information Systems with a focus in Cybersecurity. I am currently seeking entry-level help desk or SOC analyst positions where I can apply my technical skills and security mindset to protect organizational assets.

Projects

Full-Stack Password Security Lab — SecureVault™

React, Node.js, Express, PostgreSQL, bcrypt, Vercel, Render | GitHub | Live Demo
  • Built a full-stack authentication system demonstrating password security vulnerabilities and ethical password cracking techniques for educational purposes in a controlled environment.
  • Developed a React frontend with custom animations and glassmorphic UI design, connected to a Node.js/Express REST API backend, deployed on Vercel and Render with PostgreSQL database.
  • Implemented bcrypt password hashing (salt rounds: 10) with environment variable configuration for secure deployment across development and production environments.
  • Created an admin panel to export password hashes for penetration testing with John the Ripper and Hashcat, demonstrating dictionary attacks and brute-force resistance of modern hashing algorithms.
  • Showcases purple team methodology: understanding both offensive (password cracking) and defensive (secure authentication) techniques to improve overall security posture.

Honeypot Submission Portal — "Bug in My Eye"

HTML, CSS, Formspree, GitHub Pages | Live Demo
  • Designed and developed a honeypot submission portal hosted at Bug Eyed Technologies, built to safely collect and analyze suspicious user submissions for security assessment.
  • Implemented secure form handling using Formspree for backend processing without storing sensitive data client-side, ensuring privacy and data integrity within a static GitHub Pages environment.
  • Created a platform allowing individuals and organizations to report potential security issues or anomalies for personalized IT consulting and threat analysis.
  • Demonstrates understanding of honeypot concepts and secure data collection practices for cybersecurity intelligence gathering.

Consent-Based Phishing Awareness Campaign

GoPhish, Kali Linux, Social Engineering | Personal Project
  • Conducted an ethical, consent-based phishing simulation using GoPhish to evaluate user awareness and response to potential phishing threats in a controlled environment.
  • Designed realistic phishing email templates mimicking common attack vectors including credential harvesting, malicious attachments, and urgency-based social engineering tactics.
  • Analyzed campaign metrics including open rates, click-through rates, and data submission rates to identify vulnerability patterns and training opportunities.
  • Delivered actionable insights and recommendations to improve cybersecurity awareness training and organizational defensive posture through data-driven analysis.

Virtual Machine Lab Environment Setup

VirtualBox, Kali Linux, Cisco CSR1000v | CIAT Coursework
  • Configured a multi-VM lab environment using VirtualBox, including DEVASC-LAB and Cisco CSR1000v virtual router for hands-on networking and security practice.
  • Implemented network connectivity between virtual machines using internal networking and host-only adapters, verifying communication through ICMP ping tests and route configuration.
  • Optimized VM performance through resource allocation (RAM, CPU cores) and storage configuration to support concurrent operation of multiple network devices.
  • Demonstrates proficiency in virtualization technologies, network configuration, and building isolated lab environments for security testing and development.

Linux Boot Process Modification and Single-User Mode Access

GRUB, Linux System Administration, Bash | Personal Project
  • Modified GRUB bootloader configuration by editing /etc/default/grub to extend boot timeout, providing enhanced control over system startup process.
  • Gained hands-on experience with single-user mode access for system recovery and administrative tasks, demonstrating knowledge of Linux runlevels and boot parameters.
  • Applied security concepts by understanding boot-level access controls and the importance of physical security in preventing unauthorized system modifications.
  • Showcases Linux system administration skills including bootloader configuration, system recovery techniques, and understanding of the Linux initialization process.

Kali Linux Live Boot with Persistence

Kali Linux, Rufus, Partition Management | Personal Project
  • Created a portable Kali Linux penetration testing environment on USB drive using Rufus with persistent storage configuration to retain data and tools across reboots.
  • Configured partition layout including bootable system partition and encrypted persistence partition for secure storage of reconnaissance data and custom tools.
  • Modified bootloader configuration and persistence files to enable automatic mounting of persistent storage on system startup.
  • Demonstrates expertise in Linux system administration, partition management, and creating portable security testing platforms for field work and training scenarios.

Work Experience

Delivery Driver

Romito's Pizza | November 2024 - Present
  • Supported kitchen operations by effectively preparing ingredients, contributing to smooth meal production and time management under pressure.
  • Ensured accurate and timely deliveries, consistently meeting customer expectations for speed and reliability while maintaining attention to detail.
  • Delivered exceptional customer service, fostering positive client interactions and repeat business through professional communication.

AT&T Marketing Salesman

AT&T | August 2024 - September 2024
  • Technical Skills: System navigation, troubleshooting mobile devices, understanding network architecture, and explaining mobile security features to customers.
  • Security Experience: Fraud prevention, identity verification, PII protection, and detecting social engineering attacks during customer interactions.
  • Transferable Competencies: Provided user training on device security, managed access controls for account modifications, documented incidents, and ensured compliance with company policies.
  • Soft Skills: Communicated complex technical concepts to non-technical users, resolved problems efficiently under time constraints, and maintained composure during high-pressure situations.

Produce Delivery Driver

Cleveland Fish and Seafood | May 2022 - November 2022
  • Safely transported seafood products to customers while maintaining proper handling procedures and accurate delivery documentation.
  • Protected sensitive business and customer information by following data privacy and security best practices during transactions and recordkeeping.
  • Communicated clearly with dispatchers, customers, and team members to resolve delivery issues promptly and professionally.

Contact Tracer

Maxim Health Services | January 2021 - March 2022
  • Monitored health incidents using epidemiological tools and maintained HIPAA-compliant documentation of sensitive medical information.
  • Conducted confidential interviews with exposed individuals, assessed exposure risk levels, and escalated high-priority cases for rapid response coordination.
  • Leveraged data entry systems and real-time reporting platforms to assist with outbreak containment strategy for Cuyahoga County Health Department.
  • Demonstrated ability to handle sensitive information securely while working under pressure during public health emergencies.

Security Guard

MGM Northfield Park | May 2021 - August 2021
  • Conducted regular patrols of casino property to detect suspicious activity and unauthorized access, with focus on identifying security vulnerabilities and potential breaches.
  • Ensured access control at entrances and employee areas, verifying credentials and screening individuals for potential threats, applying principles of identity and access management.
  • Assisted in enforcement of security policies including credential verification, monitoring surveillance systems, and responding to security incidents.
  • Recognized and reported social engineering attempts and security vulnerabilities to management, demonstrating security awareness and threat detection capabilities.

Amazon Delivery Driver

Lance Global Logistics | August 2020 - January 2021
  • Documented delivery incidents, delays, and customer feedback following internal reporting guidelines with attention to accuracy and detail.
  • Followed security protocols to protect sensitive customer information stored on delivery devices and within Amazon's logistics system.
  • Troubleshot mobile devices and delivery applications to ensure accurate package tracking and route optimization for efficient operations.
  • Identified and reported security risks or unusual activities during deliveries, including potential fraud or suspicious customer interactions.

All-Source Intelligence Analyst

U.S. Army | January 2019 - August 2020
  • Monitored multiple secure enterprise networks (JWICS/SIPR) to identify anomalous activity, adversary indicators, and potential cyber or electronic threats in real time.
  • Conducted structured analysis of multi-source data (OSINT, SIGINT, HUMINT) to correlate indicators, reduce false positives, and assess risk severity.
  • Identified indicators of compromise (IOCs) and emerging threat patterns, escalating findings to senior leadership for decision-making.
  • Produced concise written intelligence products (INTSUMs / GRINTSUMs) comparable to incident reports and executive security briefings.
  • Supported operational risk assessments by analyzing adversary cyber capabilities, infrastructure, and tactics, techniques, and procedures (TTPs).
  • Collaborated with cross-functional teams under time-sensitive conditions to maintain situational awareness and operational readiness.
  • Maintained strict operational security (OPSEC) and compliance with classified data handling procedures in high-availability environments.

Education

Bachelor of Science in Information Systems

California Institutes of Applied Science | 2022 - 2026

Focus on Cybersecurity and Networking | Expected Graduation: April 2026

Associate's of Science in Information Technology

California Institutes of Applied Technology | 2022 - 2024

View Degree

Military All-source Intelligence

Cochise College | 2019 - 2020

Completed coursework towards an Associate's degree

Certifications

Technical Skills

Security & Analysis

  • Vulnerability Assessment
  • Network Security
  • Threat Intelligence
  • Password Cracking
  • Social Engineering

Programming & Scripting

  • Python
  • JavaScript
  • Bash Scripting
  • C/C++
  • SQL

Web Development

  • React.js
  • Node.js & Express
  • HTML/CSS
  • REST APIs
  • PostgreSQL/NoSQL

Tools & Platforms

  • Kali Linux
  • Wireshark
  • John the Ripper
  • GoPhish
  • VirtualBox
  • Git/GitHub
  • Vercel/Render