Natessa Simpson

Natessa Simpson

About

Detail

Remote Operations Specialist | Operations Support | Process Improvement | Data Analysis | IT & Cybersecurity Background
Shawnee, Oklahoma, United States

Contact Natessa regarding: 
person_search
Finding candidates
connect_without_contact
Finding mentors
groups
Networking

Timeline


work
Job
school
Education
folder
Project

Résumé


Jobs verified_user 0% verified
  • S
    Systems Support & Incident Troubleshooting Experience public Remote experience
    Self- Directed
    Dec 2022 - Current (3 years 5 months)
    Diagnosed and resolved system and application errors across Windows and Linux environments through structured troubleshooting methodologies Analyzed system logs and event data to identify root causes of performance issues, service failures, and application crashes Performed system recovery and remediation steps including service restarts, configuration corrections, and patch validation Investigated user-reported technical issues and applied systematic debugging techniques to restore system functionality Monitored system performance and stability, identifying recurring issues and implementing preventive solutions Applied endpoint and system hardening practices to improve reliability and reduce error frequency Documented troubleshooting proce
  • S
    Cloud Security & AWS Infrastructure Experience public Remote experience
    Self- Directed
    Aug 2021 - Current (4 years 9 months)
    Designed and deployed secure cloud environments using Amazon Web Services (AWS), focusing on scalable and well-architected infrastructure Configured and managed Identity and Access Management (IAM) policies to enforce least privilege access control across cloud resources Implemented secure network architectures using VPCs, subnets, security groups, and routing configurations Monitored cloud activity and security events using AWS logging services such as CloudTrail and CloudWatch Applied encryption and security best practices to protect data at rest and in transit using AWS-native security tools Simulated real-world cloud security scenarios including misconfiguration detection and remediation of access vulnerabilities Strengthened understand
  • S
    Cybersecurity Analyst (Training Lab Experience)
    Self-directed learning project
    Aug 2021 - Current (4 years 9 months)
  • Freelancer- Self employed
    V
    SOC Analyst Simulation public Remote experience
    Freelancer- Self employed, Virtual Lab / Training Platform
    Aug 2021 - Current (4 years 9 months)
    Investigated security incidents using simulated environments on TryHackMe Analyzed logs and alerts to detect suspicious activity and potential threats Performed vulnerability assessments and recommended remediation strategies Applied incident response techniques including containment and recovery Worked with tools such as Wireshark, Linux CLI, and basic SIEM dashboards
  • P
    Cloud Security Project (AWS / Azure)
    Personal project
    Aug 2021 - Current (4 years 9 months)
  • Freelancer- Self employed
    P
    Security Monitoring Project public Remote experience
    Freelancer- Self employed, Personal Project,
    Aug 2021 - Current (4 years 9 months)
    Designed and implemented a simulated Security Operations Center (SOC) environment to monitor and analyze security events Integrated log sources from Windows and Linux systems into a SIEM platform for centralized visibility Configured IDS/IPS tools (Snort/Suricata) to detect malicious network activity including port scans and brute-force attempts Monitored and analyzed alerts generated from SIEM and IDS systems, identifying Indicators of Compromise (IOCs) Performed root cause analysis on detected incidents and documented findings in structured incident reports Implemented basic cloud monitoring using AWS CloudTrail and Microsoft Azure Monitor to track suspicious activity Applied security controls aligned with NIST Cybersecurity Framework and
  • S
    Security Operations & Cloud Engineering Experience public Remote experience
    Self-Directed / Lab-Based Experience
    Aug 2021 - Current (4 years 9 months)
    Designed and supported a simulated Security Operations Center (SOC) environment for monitoring, detecting, and analyzing security events across Windows, Linux, and cloud systems Investigated security alerts using SIEM concepts and log analysis, identifying Indicators of Compromise (IOCs) and performing root cause analysis on simulated incidents Configured and evaluated IDS/IPS concepts (Snort/Suricata) to detect and respond to network-based threats such as port scans, brute-force attacks, and suspicious traffic patterns Built and managed secure cloud environments using Amazon Web Services (AWS), implementing VPC architectures, subnet segmentation, and secure routing configurations Administered Identity and Access Management (IAM) policies e
  • CTSA
    Daycare Teacher
    CTSA
    Mar 2020 - Jul 2023 (3 years 5 months)
  • F
    Cash Specialist
    Firelake Casino
    Feb 2018 - Mar 2022 (4 years 2 months)
Education verified_user 0% verified
  • Full Sail University
    SOC Analyst (Microsoft Sentinel – Cybersecurity Lab Simulation)
    Full Sail University
    Aug 2022 - Dec 2023 (1 year 5 months)
    SOC Analyst (Microsoft Sentinel – Cybersecurity Lab Simulation) Full Sail University | Cybersecurity Projects As part of my cybersecurity training at Full Sail University, I developed hands-on SOC Analyst experience using Microsoft Sentinel (Azure SIEM/SOAR) in a simulated enterprise environment. I worked with multiple data sources including Windows event logs, Azure activity logs, and Linux syslog data to monitor security events, detect threats, and investigate suspicious activity. Using Kusto Query Language (KQL), I performed security analysis to identify brute force attacks, abnormal login patterns, and suspicious PowerShell execution. I built and analyzed SOC dashboards to track authentication events, endpoint alerts, and network anomal
  • Full Sail University
    Bachelor of Science - Cybersecurity
    Full Sail University
    Jan 2022 - Apr 2026 (4 years 4 months)
  • Full Sail University
    Python Projects
    Full Sail University
    Aug 2021 - Feb 2023 (1 year 7 months)
    I have beginner-level exposure to Python through early cybersecurity learning and foundational programming concepts. I am currently developing my understanding of Python syntax, basic scripting, and how it is used in cybersecurity for automation, log analysis, and security tooling. I am actively learning how Python is applied in SOC environments for tasks such as parsing logs, automating repetitive security tasks, and supporting threat detection workflows.
  • Full Sail University
    Associate of Science - AS, Information Technology
    Full Sail University
    Jan 2021 - Dec 2022 (2 years)
Projects (professional or personal) verified_user 0% verified
  • Full Sail University
    Amazon Web Services (AWS)
    Full Sail University
    Oct 2022 - Mar 2023 (6 months)
    This document outlines my hands-on experience with Amazon Web Services (AWS) through academic and personal projects completed at Full Sail University, with an emphasis on cloud infrastructure, cybersecurity, and deployment tools. Key Project Experience: 1 Deployed and managed virtual servers using Amazon EC2, including instance configuration, SSH access, and security group management. 2 Built and managed cloud storage solutions using Amazon S3, including bucket policies, permissions, and data organization. 3 Implemented identity and access controls using AWS IAM (users, roles, and policies) to enforce least-privilege security practices. 4 Deployed basic web applications using AWS services, integrating compute, storage, and networking compon
  • Full Sail University
    Endpoint Security
    Full Sail University
    Oct 2022 - Mar 2023 (6 months)
    Secured Windows and Linux endpoints by implementing system hardening techniques including user privilege restrictions, firewall configuration, patch management, and security baseline enforcement to reduce attack surface exposure. Performed endpoint monitoring and threat analysis using Microsoft Defender, identifying malicious activity, investigating alerts, and executing containment and remediation procedures in simulated environments. Conducted malware analysis and incident response exercises by examining suspicious files, identifying indicators of compromise (IOCs), and mitigating threats through isolation, removal, and system recovery processes. Analyzed system, security, and authentication logs to detect anomalous behavior such as unaut
  • Full Sail University
    PowerShell Experience – Beginner / Interested (Full Sail University Learning Path)
    Full Sail University
    Aug 2022 - Mar 2023 (8 months)
    Currently developing foundational knowledge of PowerShell through cybersecurity coursework and self-directed learning at Full Sail University. Focused on understanding how PowerShell is used for Windows system administration, automation, and security monitoring in enterprise environments. Exploring PowerShell as a critical tool for cybersecurity operations, particularly in areas such as log analysis, system configuration, and endpoint security support. Building familiarity with command syntax, basic scripting concepts, and administrative task automation. Studying how PowerShell is used in real-world SOC environments for tasks such as reviewing Windows Event Logs, identifying suspicious processes, managing user accounts, and supporting incid
  • Full Sail University
    General Data Protection Regulation (GDPR) Experience – Full Sail University Projects
    Full Sail University
    Aug 2021 - Dec 2023 (2 years 5 months)
    This document outlines my practical and academic experience applying General Data Protection Regulation (GDPR) principles through cybersecurity, data handling, and system security projects completed at Full Sail University. My focus has been on data privacy, secure data processing, access control, and compliance-oriented security practices in simulated environments. Through hands-on labs and project-based learning, I developed a strong understanding of GDPR principles, including data minimization, purpose limitation, storage limitation, integrity, confidentiality, and accountability. I applied these principles in cloud, endpoint, and virtualized environments to ensure secure handling of sensitive information. In endpoint and system security
  • Full Sail University
    Endpoint Security & SOC Experience
    Full Sail University
    Aug 2021 - Aug 2023 (2 years 1 month)
    Secured Windows and Linux endpoints by implementing system hardening techniques including user privilege restrictions, firewall configuration, patch management, and security baseline enforcement to reduce attack surface exposure. Performed endpoint monitoring and threat analysis using Microsoft Defender, identifying malicious activity, investigating alerts, and executing containment and remediation procedures in simulated environments. Conducted malware analysis and incident response exercises by examining suspicious files, identifying indicators of compromise (IOCs), and mitigating threats through isolation, removal, and system recovery processes. Analyzed system, security, and authentication logs to detect anomalous behavior such as unaut
  • Full Sail University
    Windows Operating System Experience –(Full Sail University Projects)
    Full Sail University
    Aug 2021 - Jul 2023 (2 years)
    As part of my Windows Operating System experience at Full Sail University, I engaged in a comprehensive simulation of an enterprise Windows Active Directory (AD) environment integrated with Security Operations Center (SOC) monitoring and SIEM analysis. This project involved the implementation of real-world identity management, Group Policy enforcement, and authentication monitoring, which are critical for detecting domain-based attack activity. I configured Active Directory domain infrastructure, including Group Policy Objects (GPOs) and domain-joined endpoints, while ensuring robust security logging and SIEM correlation using a Splunk-style dashboard. In addition to my core responsibilities, I applied my knowledge of ISO/IEC 27001 standar
  • Full Sail University
    ISO/IEC 27001 Experience – Full Sail University Projects
    Full Sail University
    Aug 2021 - Jun 2023 (1 year 11 months)
    This document outlines my applied experience with ISO/IEC 27001 information security management principles through academic and lab-based cybersecurity projects completed at Full Sail University. My experience focuses on implementing structured security controls, risk management practices, and governance-aligned security operations within simulated enterprise environments. Throughout my coursework, I developed a strong understanding of ISO/IEC 27001 requirements, including information security policies, risk assessment methodologies, asset management, access control, and continuous monitoring practices. I applied these concepts in hands-on environments involving endpoint security, cloud infrastructure, and virtualized systems. In security-f
  • Full Sail University
    Penetration Testing Experience – (Full Sail University Projects)
    Full Sail University
    Aug 2021 - Mar 2023 (1 year 8 months)
    Cybersecurity Lab & Ethical Hacking Case Studies (Full Sail University – Controlled Training Environment) 1. Professional Summary This portfolio demonstrates foundational penetration testing experience gained through controlled cybersecurity labs and virtual environments. The focus is on ethical hacking methodology, vulnerability identification, and security assessment using industry-standard tools. All activities were performed in isolated, authorized lab environments (VMware / VirtualBox, intentionally vulnerable systems, and training platforms) for educational purposes only. LAB 1: Network Reconnaissance & Service Discovery Tool Used: Nmap (Network Mapper) Purpose Nmap is used to discover devices, services, and open ports within a networ
  • Full Sail University
    SOC 2 Experience –(Full Sail University Projects)
    Full Sail University
    Aug 2021 - Mar 2023 (1 year 8 months)
    As part of my SOC 2 Experience through Full Sail University Projects, I engaged in a simulated SOC 2 Type I audit, focusing on the evaluation of security controls within an enterprise IT environment. This comprehensive assessment was conducted against the AICPA SOC 2 Trust Services Criteria, covering key areas such as Security, Availability, Confidentiality, Processing Integrity, and Privacy. I reviewed various in-scope systems, including Windows and Linux endpoints, cloud infrastructure (AWS EC2, S3, IAM concepts), and network security layers, while utilizing a SIEM monitoring platform to enhance our security posture. In addition to my core responsibilities, I applied Root Cause Analysis (RCA) techniques to investigate security events an
  • Full Sail University
    Network Security Experience – (Full Sail University Projects)
    Full Sail University
    Aug 2021 - Mar 2023 (1 year 8 months)
    As a Network Security professional involved in Full Sail University projects, I simulated an enterprise-grade Network Security Operations Center (SOC) responsible for monitoring, detecting, and responding to network-based threats. This experience encompassed a comprehensive understanding of network traffic monitoring, firewall rule enforcement, intrusion detection and prevention, and SIEM-based log correlation and alerting. I developed a simulated network architecture that included a DMZ zone for public-facing web servers, an internal network with employee workstations, and a secure zone for database servers, all protected by a robust security layer featuring firewalls and IDS/IPS monitoring. In addition to these core responsibilities, I
  • Full Sail University
    Microsoft Azure Experience – (Full Sail University Projects)
    Full Sail University
    Aug 2021 - Mar 2023 (1 year 8 months)
    Developed hands-on experience with Microsoft Azure through academic coursework and cloud security lab environments at Full Sail University. Focused on cloud infrastructure management, identity and access control, virtual machine deployment, and foundational cloud security practices aligned with real-world enterprise environments. Worked with core Azure services to deploy and manage virtual machines, configure networking components, and understand cloud resource architecture. Gained practical experience provisioning and managing cloud-based compute resources while applying security best practices for access control and system configuration. Implemented identity and access management principles using Microsoft Entra ID (Azure Active Directory
  • Full Sail University
    Intrusion Prevention System (IPS) Experience – Full Sail University Projects
    Full Sail University
    Aug 2021 - Mar 2023 (1 year 8 months)
    SOC Analyst Simulation – Splunk SIEM Environment (Full Sail University Lab Project) Environment Overview This simulation was completed in a controlled cybersecurity lab environment at Full Sail University using a SIEM-style setup modeled after enterprise SOC operations. The environment included log sources from Windows endpoints, Linux systems, network traffic tools, and security monitoring dashboards designed to replicate a real Security Operations Center (SOC) workflow. The primary SIEM platform used in this simulation was Splunk (conceptual lab implementation) for log ingestion, correlation, alerting, and security event visualization. SOC Monitoring & SIEM Dashboard Activity 1. Security Event Monitoring (Splunk Dashboard Simulation) Moni
  • Full Sail University
    NIST Cybersecurity Framework (NIST CSF) Experience –(Full Sail University Projects)
    Full Sail University
    Aug 2021 - Mar 2023 (1 year 8 months)
    As a participant in the Full Sail University projects focused on the NIST Cybersecurity Framework (NIST CSF), I contributed to the development of a simulated enterprise cybersecurity program that effectively aligns with the NIST CSF across various organizational systems, including endpoint security, cloud infrastructure, and network monitoring. This project involved integrating security operations (SOC) functions with compliance monitoring (GRC) through SIEM-style log aggregation, incident tracking, and risk-based reporting. My primary objective was to ensure continuous compliance with the NIST CSF core functions: Identify, Protect, Detect, Respond, and Recover. In this simulated environment, I utilized a comprehensive technology stack, in
  • Full Sail University
    Root Cause Analysis (RCA) Experience – (Full Sail University Projects)
    Full Sail University
    Aug 2021 - Mar 2023 (1 year 8 months)
    As a participant in the Root Cause Analysis (RCA) experience at Full Sail University, I engaged in a comprehensive Digital Forensics & Incident Response (DFIR) report that simulated an enterprise security breach. This project involved a detailed investigation of a suspected endpoint compromise and potential data exfiltration within a corporate network environment. Utilizing SOC and DFIR methodologies, I conducted SIEM log analysis, endpoint forensics, and network traffic inspection to identify the attack vector and recommend remediation steps. The final determination revealed that the incident stemmed from a phishing-based credential compromise, leading to unauthorized endpoint access and attempted lateral movement within the network. Thro
  • Full Sail University
    Intrusion Detection System (IDS) Experience – Full Sail University Projects
    Full Sail University
    Aug 2021 - Jan 2023 (1 year 6 months)
    This document outlines my hands-on experience with Intrusion Detection Systems (IDS) gained through cybersecurity labs and project-based learning at Full Sail University. My focus has been on monitoring network activity, identifying suspicious behavior, analyzing security alerts, and supporting early-stage incident detection in simulated SOC environments. Throughout my coursework, I developed a strong understanding of IDS concepts, including signature-based and anomaly-based detection methods, alert generation, traffic monitoring, and event correlation. I applied these concepts in virtual lab environments to simulate real-world network security monitoring and threat detection scenarios. In lab-based security projects, I monitored network t
  • Full Sail University
    Intrusion Prevention System (IPS) Experience – Proficient (Full Sail University Projects)
    Full Sail University
    Aug 2021 - Jan 2023 (1 year 6 months)
    Developed practical, hands-on experience with Intrusion Prevention Systems (IPS) through cybersecurity coursework and simulated enterprise lab environments at Full Sail University. Focused on real-time threat prevention, network traffic inspection, and automated security response within controlled virtual infrastructures. Applied IPS concepts in lab scenarios to understand how malicious network traffic is actively detected and blocked before reaching endpoint systems. Worked with core IPS functions including deep packet inspection (DPI), signature-based detection, and anomaly-based prevention techniques to identify and stop suspicious activity. Monitored and evaluated network traffic for intrusion attempts such as port scanning, brute-force
  • Full Sail University
    Personal
    Full Sail University
    Jan 2021 - Dec 2023 (3 years)
    This document outlines my hands-on experience with Amazon Web Services (AWS) through academic and personal projects completed at Full Sail University, with an emphasis on cloud infrastructure, cybersecurity, and deployment tools. Key Project Experience: 1 Deployed and managed virtual servers using Amazon EC2, including instance configuration, SSH access, and security group management. 2 Built and managed cloud storage solutions using Amazon S3, including bucket policies, permissions, and data organization. 3 Implemented identity and access controls using AWS IAM (users, roles, and policies) to enforce least-privilege security practices. 4 Deployed basic web applications using AWS services, integrating compute, storage, and networking compon