Skip to content
View VioletFigueroa's full-sized avatar

Highlights

  • Pro

Block or report VioletFigueroa

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
VioletFigueroa/README.md

Hi there πŸ‘‹ I'm Violet Figueroa

CompTIA Security+ | Cybersecurity Analyst | Accessibility-Integrated Security | VanLUG Board

LinkedIn Portfolio Email


🎯 About Me

I'm a CompTIA Security+ certified cybersecurity analyst with hands-on lab training in incident response, digital forensics, and vulnerability assessment through Lighthouse Labs bootcamp. I bring practical IT and security experience from a small business role, plus a full-stack web development background.

What I Do:

  • πŸ” Incident Response & Digital Forensics – Trained in DFIR methodology through 30+ bootcamp labs (Volatility, Autopsy, Wireshark)
  • πŸ›‘οΈ Vulnerability Management – Lab experience with OpenVAS scanning, CVE analysis, CVSS scoring, and remediation planning
  • πŸ” Application Security – Full-stack developer background (Node.js, React, PostgreSQL) with OWASP Top 10 awareness
  • πŸ“Š SIEM & Log Analysis – Bootcamp training with Splunk and QRadar for alert triage, log correlation, and detection rules
  • πŸ‘₯ Security Awareness – Taught basic security practices to a small business team; created accessible documentation

What Sets Me Apart:

  • βœ… Practical security experience – Deployed endpoint protection (Malwarebytes), password management (Bitwarden), and firewall rules for a small assistive-device business
  • βœ… Taught basic security hygiene to a non-technical team and created training materials
  • βœ… Reviewed PIPEDA and GDPR requirements and created privacy policies for an ecommerce business
  • βœ… Accessibility-integrated security – Experience making security controls work for users of assistive technologies
  • βœ… Full-stack developer + security analyst – Understand the software development lifecycle for secure code review and AppSec work
  • βœ… Mission-driven values – Passionate about open-source, digital privacy, right-to-repair, and sustainable technology

πŸ› οΈ Technical Skills

πŸ”’ Security Tools & Frameworks

SIEM & Log Analysis: Splunk (lab), QRadar (lab), log correlation and alert triage
Forensics & Memory Analysis: Volatility (lab), Autopsy (lab), Wireshark (lab), chain-of-custody procedures
Vulnerability Assessment: OpenVAS (lab), CVSS scoring, remediation prioritization
Web Application Security: BurpSuite (lab), OWASP ZAP (lab), secure code review
Network Security: Nmap (lab), Windows Firewall, VPN, routing & switching, Wi-Fi security
Threat Intelligence: MITRE ATT&CK mapping, threat analysis
Standards & Frameworks: NIST 800-53, ISO 27001, CIS Controls, OWASP Top 10, PCI DSS (basic), GDPR, PIPEDA, TLP classification

πŸ’» Core Technical Competencies

Languages: Python, Bash, JavaScript (ES6+), SQL, HTML5, CSS3
Backend: Node.js, Express, REST APIs, JSON processing
Frontend: React, responsive design, accessibility (WCAG 2.1)
Databases: PostgreSQL, parameterized queries (SQL Injection prevention)
Systems: Linux (Debian/Kali), Windows, macOS
DevOps: Docker, Git, CI/CD integration, GitHub Actions

πŸ“ˆ Analysis & Business Skills

Incident Response Lifecycle: Preparation β†’ Detection β†’ Analysis β†’ Containment β†’ Eradication β†’ Recovery β†’ Post-Incident
Communication: Technical concepts translated for non-technical audiences; security training for small business team
Documentation: Incident reports, playbooks, policies, forensic reports, threat assessments
Community Leadership: VanLUG board member, informal guidance to people exploring cybersecurity careers
Accessibility Advocacy: WCAG 2.1 compliance, neurodivergent-inclusive security practices


πŸ“‚ Featured Projects

🚨 Incident Response & Digital Forensics

Project Focus Highlight
Premium House Lights: The Heist Full-scope DFIR investigation Simulated ransomware attack response, root cause analysis, actionable recommendations
Intellectual Property Theft Investigation Digital forensics case study Memory analysis (Volatility), disk forensics (Autopsy), network traffic analysis, malware deployment timeline
LifeLabs Data Breach Audit Real-world breach analysis Governance audit, PIPEDA compliance assessment, breach timeline reconstruction
P7: IR Plan, Playbook & Policy Incident response framework Complete IR plan, playbooks for phishing/ransomware, escalation paths, TLP classification

πŸ” Vulnerability & Risk Management

Project Focus Highlight
P11: Secure Architecture Report Defense-in-depth architecture Enterprise network design, security control recommendations, attack surface mitigation
P6: Cat's Company Vulnerabilities Vulnerability assessment CVE identification, CVSS prioritization, remediation roadmap, control implementation
P5: Risk Management Case Study ISO 27001 compliance Risk matrix, controls mapping, regulatory gap analysis, compliance audit
P2: Report on Risks & Vulnerabilities Security posture baseline Risk and vulnerability assessment, prioritized remediation, management reporting

🎯 Network Security & Log Analysis

Project Focus Highlight
LogHawk – Security Log Monitoring Tool Log automation & analysis Python/Bash log parsing, anomaly detection, threat identification automation, open-source
P1: Network Administration Network infrastructure security Nmap/Wireshark analysis, network topology documentation, security baseline, audit compliance

πŸ›‘οΈ Application Security (OWASP Focus)

Project Security Focus Technology
TinyApp A07: Identification & Authentication Failures bcrypt, cookie-session, secure authentication
Tweeter A03: Injection / XSS Prevention Input validation, output encoding, DOM sanitization
LightBnB A03: SQL Injection Prevention Parameterized queries, prepared statements
Interview Scheduler Testing & Reliability Jest/Cypress, CI/CD integration, security testing

πŸš€ Open Source & DevTools

Project Purpose Impact
Resume Automator ATS optimization + cover letter generation Python/Jinja2, role-specific resume customization, PII protection
Perplexport AI conversation backup tool TypeScript/Puppeteer, API automation, data sovereignty
Knowledge Pipeline Self-hosted secure infrastructure Docker, Nextcloud, local LLM integration, secure development environment

πŸŽ“ Education & Certifications

Primary Credential

πŸ† CompTIA Security+ (SY0-701) | Expires August 2028
Comprehensive cybersecurity certification covering threat management, vulnerability management, incident response, and compliance.

Advanced Training

  • Cyber Security Bootcamp Diploma – Lighthouse Labs (Completed May 2025) | 30+ hands-on labs, strong performance across cohort
  • Advent of Cyber 2025 – TryHackMe Challenge Series

πŸ’Ό Professional Experience

Web Developer & IT Support

Accessible Places | Remote, Vancouver | Sept 2022 – Jan 2024

Key Achievements:

  • 🎯 Sole technical resource for a small assistive-device ecommerce business (~5 people), handling web development, IT support, security hardening, and social media management
  • πŸ” Migrated organization from plaintext password storage to Bitwarden password manager; deployed Malwarebytes anti-malware across business devices
  • βœ… Configured Windows Firewall rules, set up MFA on business accounts, and conducted 3 security reviews (website, business operations, social media) using self-directed learning
  • πŸ“ Reviewed PIPEDA and GDPR requirements and created privacy and cookie policies for the ecommerce storefront

🌟 What I Bring to Your Organization

βœ… Incident Response Training – 30+ hands-on bootcamp labs covering the complete DFIR lifecycle, from detection through post-incident analysis
βœ… Practical Security Experience – 1.5 years of hands-on IT and security work at a small business, 10+ years freelance IT, CompTIA Security+ certified
βœ… Cross-Domain Skills – Full-stack developer + security analyst = understanding of AppSec, OWASP, secure coding practices
βœ… Communication Strength – Comfortable explaining technical concepts to non-technical audiences; created accessible documentation and training materials
βœ… Accessibility Advocacy – Create inclusive security solutions that work for neurodivergent practitioners and assistive technology users


πŸ”— Let's Connect

Explore My Work:


Last Updated: February 20, 2026
Topics: cybersecurity, incident-response, digital-forensics, application-security, owasp, vulnerability-assessment, iso-27001, nist, siem, accessibility, security-operations

Passionate about making cybersecurity more accessible, sustainable, and inclusive. Let's build secure systems together! πŸš€

Pinned Loading

  1. Premium-House-Lights Premium-House-Lights Public

    Full-scope digital forensics investigation and incident response following a cyberattack at Premium House Lights, a fictional small business. The case includes discovery, log analysis, lateral move…

  2. Security-Architecture-Assessment Security-Architecture-Assessment Public

    Comprehensive endpoint security assessment and secure architecture analysis incorporating NIST 800-53 control gap analysis. This project provides a detailed inventory of organizational assets, eval…

  3. iso27001-risk-management-framework iso27001-risk-management-framework Public

    Comprehensive risk management plan aligned with ISO 27001 information security management standards. This project demonstrates a systematic approach to identifying, analyzing, and mitigating inform…

  4. network-scanning-analysis-security network-scanning-analysis-security Public

    Network administration and digital forensics project featuring network scanning, traffic analysis, and executive reporting. This project demonstrates network reconnaissance techniques, vulnerabilit…

  5. tinyapp tinyapp Public

    TinyApp is a full-stack web application built with Node.js and Express that allows users to shorten long URLs (similar to bit.ly). The project demonstrates fundamental web application security conc…

    JavaScript