Tyler Burke - IT & Cybersecurity Professional

Tyler Burke's Website

IT & Cybersecurity Professional

About Me

Results-driven cybersecurity and IT professional with a background in threat detection, risk analysis and open source analysis. Former U.S. Army Intelligence Analyst who is currently pursuing a Bachelor's Degree in Information systems with a focus in Cybersecurity. I am currently seeking any entry level help desk or SOC analyst position.

Projects

Honeypot Submission Portal — “Bug in My Eye” (IT Consulting Platform)

HTML,CSS, Claude, Formspree | GitHub
  • For this project, I designed and developed a honeypot submission portal hosted at Bugr eyed Technologies (click Button at top of page) built to safely collect and analyze suspicious user submissions. The goal was to allow individuals and organizations to report potential security issues or anomalies so I could assess them and provide personalized IT consulting support. Using Formspree for backend form handling, I built a seamless and safe submission process without storing sensitive data directly on the client side. This ensures privacy, data integrity, and ease of integration within a static GitHub Pages environment. The honeypot component helps identify malicious patterns while providing real-world examples for analysis and client education.

Website creation for a portfolio.

HTML,CSS,JavaScript | GitHub
  • Developed a responsive personal portfolio to showcase technical skills and projects. Built using HTML, CSS and JavaScript, with a focus on clean UI design, mobile responsiveness and performance optimization, leveraged AI tools such as ClaudeAI and Github Copilot to assist with content generation, layout design and code efficiency. This Project highlights front-end development skills, modern design practices, and the practical integration of AI-assisted development into the web creation process.

Consent based Phishing awareness campaign

gophish, Kali Linux | Personal Project, Loi Liang Yang
  • Conducted an ethical, consent-based phishing simulation using GoPhish to evaluate user awareness and response to potential phishing threats. The campaign was performed entirely in a controlled environment with participants who voluntarily agreed to take part. The purpose was to identify areas for improvement in cybersecurity awareness and to enhance the organizations defensive posture through data-driven insights.

Verifying two Virtual Machines Connection

Virtualkization, Kali Linux | CIAT
  • The first step in setting up the lab environment is installing the DEVASC-LAB virtual machine on VirtualBox. To begin, the DEVASC-LAB image must be downloaded from Cisco's official resources. Once the download is complete, VirtualBox is used to import the appliance. This is done by selecting the "Import Appliance" option and choosing the .ova file for the DEVASC-LAB. During the import process, it is important to review and adjust settings such as the amount of memory and number of CPUs allocated to the VM to ensure optimal performance. After the appliance has been successfully imported, the VM can be started to verify that it boots correctly and is ready for use.
  • Following the installation of the DEVASC-LAB VM, the next task is to install the CSR1000v virtual machine. Unlike the DEVASC-LAB, the CSR1000v often requires a more manual setup process. After downloading the CSR1000v image from Cisco, a new virtual machine must be created in VirtualBox. During the creation process, the operating system type should be set to "Linux" and the version should be selected as "Other Linux (64-bit)." Adequate system resources must be allocated, typically including at least 4 GB of RAM and multiple CPU cores. The downloaded CSR1000v disk image, whether ISO or VHD format, must then be attached to the new VM's storage settings. Once configured, the VM can be started, and any required initial setup steps for the CSR1000v router can be completed
  • After both virtual machines have been installed and started, it is necessary to verify communication between them. To accomplish this, both VMs must be connected to the same VirtualBox network, such as an internal network or a host-only adapter. Once network settings are properly configured, the DEVASC-LAB VM can be used to initiate a ping to the IP address of the CSR1000v VM. Receiving successful ping replies confirms that the two machines can communicate effectively, completing the basic setup process.

Exploring and modifying Linux boot process

Python, BeautifulSoup, Requests | Personal Project
  • I Logged into the Virtual Machine, Opened the Terminal to modify GRUB Settings: Edit the /etc/default/grub file using sudo vi /etc/default/grub. Changed the GRUB_TIMEOUT=5 to GRUB_TIMEOUT=30. Updated the GRUB Configuration by running sudo grub2-mkconfig -o /boot/grub2/grub.cfg to apply changes. Reboot the System, Reboot with sudo reboot. If the GRUB menu doesn't appear, hold the left shift key during boot. Enter Single User Mode When GRUB menu appears, press e to edit. Add single after the word "quiet" in the "linux" line. Press Ctrl-x to boot into single-user mode. Verify Root Access: Enter the root password when prompted. Confirm root login with id and check the run level with runlevel. Continue Booting: Press Ctrl-d to continue booting normally.

Kali Linux Live Boot with Persistence Creation

Python, BeautifulSoup, Requests | Personal Project
  • I created a Kali Linux live boot with persistence using Rufus to set up a portable and customizable penetration testing environment. This involved using Rufus to create a bootable USB drive with Kali Linux, configuring a persistent storage partition to retain data across reboots, and ensuring proper bootloader settings for persistence. The process also included partitioning the drive, editing configuration files, and testing the setup to verify that changes, such as installed tools or files, would persist after restarting. The project combined skills in Linux system administration, partition management, and cybersecurity best practices.

Work Experience

Delivery Driver

Romitos Pizza. | November 2024 - Present
  • Supported kitchen operations by effectively preparing ingredients, contributing to smooth meal production.
  • Ensured accurate and timely deliveries, consistently meeting customer expectations for speed and reliability.
  • Delivered Exceptional customer service, fostering positive client interactions and repeat business.

AT&T marketing salesmen

August 2024 - September 2024
  • Technical skills: System navigation, troubleshooting, network architecture, and mobile security features.
  • Security experience: Fraud prevention, identity verification, PII protection, and detecting social engineering attacks.
  • Transferable Competencies: Provide user training, manage access controls, document incidents, ensure compliance, and work across multiple platforms.
  • Soft Skills: Communicate technical concepts to non-technical users, solve problems efficiently, and maintain composure under pressure.

produce delivery driver

Cleveland Fish and Seafood | May 2022 - November 2022
  • Safely transport seafood products to customers while maintaining proper handling and delivery documentation.
  • Protect sensitive business and customer information by following data privacy and security best practices.
  • Communicate clearly with dispatchers, customers, and team members to resolve issues promptly and professionally.

Contact Tracer

Maxim Health Services | Jan 2024 - Mar 2022
  • Monitored Health incidents using epidemiological tools and maintained HIPAA-compliant documentation.
  • Conducted confidential interviews, assessed exposure risk, and escalated high-priority cases for rapid response.
  • Leveraged data entry and real-time reporting to assist with outbreak containment strategy for Cuyahoga County.

Security Gaurd

MGM Northfield Park | May 2021 - August 2021
  • Conduct regular patrols of the property to detect suspicious activity and unauthorized access, with a focus on identifying vulnerabilities or breaches.
  • Ensure that access points (e.g., entrances, employee areas) are secure and only authorized personnel are granted access, applying principles of identity and access management.
  • Assist in the enforcement of security policies, including verifying credentials and screening individuals for potential threats.
  • Recognize and report social engineering attempts and security vulnerabilities to management or the IT team.

Amazon Delivery

Lance Global Logistics | August 2020 - January 2021
  • Document delivery incidents, delays, or customer feedback, following internal reporting guidelines
  • Follow security protocols to protect sensitive customer information stored on delivery devices or within the Amazon system.
  • Troubleshoot mobile devices and delivery applications to ensure accurate tracking and route optimization.
  • Identify and report any security risks or unusual activities during deliveries, including potential fraud or suspicious interactions with customers.

All-Source Intelligence Analyst

U.S Army | January 2019- August 2020
  • Conducted real-time threat analysis and delivered multi-layered intelligence reports supporting operations.
  • Utilized multi-source intelligence to produce comprehensive breifings for executive decision-makers.
  • Breifed Commanders with actionable intelligence using PMESII-ASCOPE models and geo-spatial data.
  • Produced weekly INTSUMs and GRINTSUMS; identified indicators of compromise and potential security vulnerabilities.

Education

Bachelor of Science in Information Systems

California Institutes of Applied Science | 2022 - 2026

Focus on Cybersecurity and networking

Certifications

  • CompTIA Security+
  • CompTIA IT Fundamentals (ITF+)

Skills

Security

  • Vulnerability Assessment
  • Network Security

Programming

  • Python
  • JavaScript
  • Bash Scripting
  • C/C++

Tools & Technologies

  • Kali Linux
  • Wireshark

Web Development

  • HTML/CSS
  • SQL/NoSQL