AWS Passwordless Authentication & SOC Simulation
IAM & security foundation with Cognito (WebAuthn) + MFA; continuous monitoring with Security Hub, GuardDuty, CloudTrail, and Config.
View repo βWhere Curiosity Meets Growth .
View My RΓ©sumΓ©Hi! Iβm Tazahnae Matthews, a tech driven problem solver passionate about cybersecurity, education, and community impact. My journey began in public service and nonprofit program coordination, where I learned how to manage complex systems, track high volume municipal data, and build educational experiences that spark curiosity in young learners. These roles strengthened my ability to stay calm under pressure, analyze complex operational issues, and communicate clearly with diverse stakeholders.
As I grew professionally, I found myself drawn to cybersecurity the intersection of technology, human behavior, and problem-solving. Today, Iβm channeling those strengths into hands on security work: building virtual lab environments, exploring vulnerabilities, documenting findings, and developing strong foundational skills in Linux, networking, cloud security, and secure system design. I enjoy understanding how systems break, how attackers think, and how defenders build resilience.
Iβm actively working toward Security+ and CCNA while expanding my experience with virtual machines, cloud tools, and threat analysis. Whether Iβm configuring a training range in Kali and Metasploitable2, analyzing logs, or experimenting with AWS security services, I love taking on challenges that push me to think critically and creatively.
My career goal is to become a SOC Analyst or Cybersecurity Analyst, where I can use my communication skills, persistence, and technical curiosity to help defend organizations from real world threats. Long term, I aim to continue inspiring the next generation of technologists through STEAM for Me by creating learning environments that uplift students, especially those who never imagined themselves in tech.
Every project I build, every lab I document, and every skill I learn brings me one step closer to becoming the security professional Iβm meant to be resilient, resourceful, and always learning.
Each project in this portfolio represents a step in my cybersecurity journey blending creativity, problem-solving, and hands-on experimentation. From building secure AWS environments and virtual machine labs to developing an interactive chatbot that teaches core cyber concepts, every project was designed to strengthen real-world technical skills while reflecting my passion for innovation and accessibility in tech. βΈ» π».
IAM & security foundation with Cognito (WebAuthn) + MFA; continuous monitoring with Security Hub, GuardDuty, CloudTrail, and Config.
View repo βPractice range on an M1 Mac using UTM: Kali, Metasploitable 2, and Windows Server 2022 with secure networking.
View setup βCustom CLI chatbot to practice logic, user interaction, and simple automation to support cyber learning.
View Chatbot Repo βSummary: My Capstone Case Study explored the intersection of offense and defense in cybersecurity through a controlled penetration test and network hardening simulation. The project recreated a real-world attack scenario where Kali Linux functioned as the attacker, targeting a deliberately vulnerable Metasploitable 2 machine. Acting as the firewall and traffic monitor, pfSense was implemented to capture packets, filter malicious traffic, and simulate how security teams analyze live intrusion attempts. The goal was to gain hands on experience in vulnerability assessment, exploitation, and incident response within a secure, ethical lab environment. Using UTM on macOS, I created three isolated virtual machines Kali (attacker), Metasploitable 2 (target), and pfSense (defender). I conducted network scans with Nmap, executed controlled exploits with Metasploit, and validated results through Wireshark packet captures and pfSense firewall logs.
Objective: Simulate a realistic penetration test using Kali Linux against a vulnerable Metasploitable 2 machine, with pfSense as a monitoring firewall.
Environment: UTM on macOS with three isolated VMs β Kali (attacker), Metasploitable 2 (target), and pfSense (defender/firewall).
Findings: Multiple exploitable services detected (FTP, Telnet, and web apps). Wireshark verified attack patterns while pfSense logged filtered attempts.
Outcome: Improved firewall rule design and incident visibility, emphasizing proactive monitoring and layered defense strategy.
My featured writeups capture the process behind my cybersecurity labs and projects translating complex technical exercises into practical learning stories. Each writeup breaks down my approach, tools used, key findings, and lessons learned in a way thatβs both educational and easy to follow. These reflections highlight my ability to think critically, document effectively, and communicate cybersecurity concepts with clarity and creativity.
π« Iβm always open to collaborating on projects, sharing knowledge, or connecting with others passionate about cybersecurity and tech education.
Or email me directly: t.matthews@steamforme.org