root@felix:~#
root@felix:~#_

Felix Llorente

SysAdmin Junior | Security Specialist | C1 English

Securing infrastructure, hardening systems, and building resilient networks. Passionate about offensive and defensive cybersecurity.

Access Portfolio
AVAILABLE FOR HIRE

// ABOUT

System Profile

IT professional specialized in systems administration and cybersecurity. Experience in EDR/XDR deployment, Cisco Meraki network management, and Sophos phishing campaign analysis. Focused on building secure, resilient infrastructure.

Experience

IT Support

Anadat Technology & Soljem

EDR/XDR management, Cisco Meraki configuration, Sophos phishing analysis, and endpoint security operations.

Education

  • Tecnico Superior en ASIR (Network Systems Administration)
  • Tecnico Superior en SMR (Microcomputer Systems & Networks)

Certifications

  • AWS Academy Graduate - Cloud Security Foundations
  • AWS Certification (New)
  • Cisco Certified Ethical Hacker

// CAPABILITIES

Skill Matrix

Security

Threat analysis, EDR/XDR, vulnerability assessment, incident response

Networks

Cisco Meraki, routing & switching, firewalls, VPN tunneling

Systems

Windows Server, Linux administration, Active Directory, GPO management

Cloud

AWS Security Foundations, cloud architecture, IAM policies

Programming

Python scripting, Bash automation, PowerShell, network tools

// THE VAULT

Projects

Access Level: PUBLIC

Network Security Audit Tool

Automated network vulnerability scanner with comprehensive reporting.

PythonNmapSecurity
View Project
Access Level: RESTRICTED

SIEM Dashboard

Custom security information and event management dashboard for real-time monitoring.

ELK StackSecurityMonitoring
View Project
Access Level: CLASSIFIED

Phishing Simulation Platform

Internal phishing campaign tool for security awareness training.

SophosSocial EngineeringTraining
View Project
Access Level: PUBLIC

Infrastructure Hardening Scripts

Automated server hardening and CIS benchmark compliance scripts.

BashPowerShellHardening
View Project

// INTEL FEED

Latest Intelligence

EDR vs XDR: A Practical Comparison

Deep dive into the differences between EDR and XDR solutions, and when to deploy each in enterprise environments.

SecurityEDRXDR
Read Full Report

Cisco Meraki: Zero Trust Implementation

Step-by-step guide to implementing zero trust network architecture using Cisco Meraki.

NetworksMerakiZero Trust
Read Full Report

AWS Cloud Security Best Practices

Essential security configurations for AWS environments, from IAM to VPC hardening.

CloudAWSSecurity
Read Full Report

// SECURE CHANNEL

Establish Connection

secure_channel.sh