🌻

Cybersecurity in Bloom

By Tazahnae Matthews

Welcome To My Portfolio

Where Curiosity Meets Growth .

View My RΓ©sumΓ©
About Me

Hi! I’m Tazahnae Matthews, a tech driven problem solver passionate about cybersecurity, education, and community impact. My journey began in public service and nonprofit program coordination, where I learned how to manage complex systems, track high volume municipal data, and build educational experiences that spark curiosity in young learners. These roles strengthened my ability to stay calm under pressure, analyze complex operational issues, and communicate clearly with diverse stakeholders.

As I grew professionally, I found myself drawn to cybersecurity the intersection of technology, human behavior, and problem-solving. Today, I’m channeling those strengths into hands on security work: building virtual lab environments, exploring vulnerabilities, documenting findings, and developing strong foundational skills in Linux, networking, cloud security, and secure system design. I enjoy understanding how systems break, how attackers think, and how defenders build resilience.

I’m actively working toward Security+ and CCNA while expanding my experience with virtual machines, cloud tools, and threat analysis. Whether I’m configuring a training range in Kali and Metasploitable2, analyzing logs, or experimenting with AWS security services, I love taking on challenges that push me to think critically and creatively.

My career goal is to become a SOC Analyst or Cybersecurity Analyst, where I can use my communication skills, persistence, and technical curiosity to help defend organizations from real world threats. Long term, I aim to continue inspiring the next generation of technologists through STEAM for Me by creating learning environments that uplift students, especially those who never imagined themselves in tech.

Every project I build, every lab I document, and every skill I learn brings me one step closer to becoming the security professional I’m meant to be resilient, resourceful, and always learning.


Featured Work

Each project in this portfolio represents a step in my cybersecurity journey blending creativity, problem-solving, and hands-on experimentation. From building secure AWS environments and virtual machine labs to developing an interactive chatbot that teaches core cyber concepts, every project was designed to strengthen real-world technical skills while reflecting my passion for innovation and accessibility in tech. ⸻ 🌻.

AWS β€’ Terraform β€’ Security

AWS Passwordless Authentication & SOC Simulation

IAM & security foundation with Cognito (WebAuthn) + MFA; continuous monitoring with Security Hub, GuardDuty, CloudTrail, and Config.

View repo β†—
Virtualization

Virtual Machine Lab (UTM on Mac)

Practice range on an M1 Mac using UTM: Kali, Metasploitable 2, and Windows Server 2022 with secure networking.

View setup β†—
Chatbot β€’ AI

Chatty Bot Project

Custom CLI chatbot to practice logic, user interaction, and simple automation to support cyber learning.

View Chatbot Repo β†—

🧩 Case Study Capstone β€” Kali Linux Attack on Metasploitable 2

Summary: My Capstone Case Study explored the intersection of offense and defense in cybersecurity through a controlled penetration test and network hardening simulation. The project recreated a real-world attack scenario where Kali Linux functioned as the attacker, targeting a deliberately vulnerable Metasploitable 2 machine. Acting as the firewall and traffic monitor, pfSense was implemented to capture packets, filter malicious traffic, and simulate how security teams analyze live intrusion attempts. The goal was to gain hands on experience in vulnerability assessment, exploitation, and incident response within a secure, ethical lab environment. Using UTM on macOS, I created three isolated virtual machines Kali (attacker), Metasploitable 2 (target), and pfSense (defender). I conducted network scans with Nmap, executed controlled exploits with Metasploit, and validated results through Wireshark packet captures and pfSense firewall logs.

Objective: Simulate a realistic penetration test using Kali Linux against a vulnerable Metasploitable 2 machine, with pfSense as a monitoring firewall.

Environment: UTM on macOS with three isolated VMs β€” Kali (attacker), Metasploitable 2 (target), and pfSense (defender/firewall).

Findings: Multiple exploitable services detected (FTP, Telnet, and web apps). Wireshark verified attack patterns while pfSense logged filtered attempts.

Outcome: Improved firewall rule design and incident visibility, emphasizing proactive monitoring and layered defense strategy.

πŸ“˜ View Full Case Study PDF β†—


Featured Writeups & Summaries

My featured writeups capture the process behind my cybersecurity labs and projects translating complex technical exercises into practical learning stories. Each writeup breaks down my approach, tools used, key findings, and lessons learned in a way that’s both educational and easy to follow. These reflections highlight my ability to think critically, document effectively, and communicate cybersecurity concepts with clarity and creativity.

πŸ”₯ Firewall Simulation β€” Quick Summary
Open Full PDF β†—
🌐 Network Lab Summary β€” Packet Tracer
Open Full PDF β†—

πŸš€ Learning & Credentials
🎯 In Progress (2025): πŸ›‘οΈ TryHackMe My Completed Rooms : View Full TryHackMe Profile β†— πŸ… My Acheivements (Credly Badges): View Full Credly Profile β†—

Let’s Connect

πŸ“« I’m always open to collaborating on projects, sharing knowledge, or connecting with others passionate about cybersecurity and tech education.

Or email me directly: t.matthews@steamforme.org