Skip to content
View EgereDavid's full-sized avatar
💭
until the cloud become mountains
💭
until the cloud become mountains

Block or report EgereDavid

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
EgereDavid/README.md

Hi there, Its me!!! SecureWithDavid!

profile IT Support & security Analyst

I’m an IT Support professional turning cybersecurity analyst, grounded in Endpoint security, user support, and troubleshooting experience. I bring a practical edge to security—translating technical issues into clear, actionable defense strategies. With a strategist’s mindset and growing expertise in networking, Python, SQL, and Linux tools, I’m driven to protect what others depend on.


About Me

Growing up in the heart of 'God's Own State,' Nigeria, my technical journey began early, collecting and repairing old electronics at childhood.

That childhood curiosity has evolved into a robust IT background, equipping me with the capacity to troubleshoot complex system issues and collaborate effectively to achieve shared goals. Today, I channel that same problem-solving drive, sharpened by my love for chess, into critical thinking and rigorous attention to detail within security settings.

TECHNICAL SKILLS

  • Security & Support: Endpoint Security, User Support, Troubleshooting, Defense Strategies
  • Networking: DNS, TCP/IP, Connectivity Diagnostics
  • Tools & Languages: Python, SQL, Linux, Command Line

📂 PORTFOLIO PROJECTS

Scenario: A client couldn't access the internet despite being connected to Wi-Fi. Action: Diagnosed a "soft" failure using ping and nslookup. Traced the root cause to a static, invalid DNS entry (10.0.0.0). Result: Restored connectivity by configuring Cloudflare Public DNS and flushing the cache.

Scenario: Client suspected persistent malware mechanisms on a workstation. Action: Conducted a forensic audit using Sysinternals Autoruns and VirusTotal API. Identified and disabled high-risk unsigned drivers while avoiding false positives in the Registry (WoW64). Result: Achieved 0 active intrusions and maintained 100% system stability.

Scenario: Production workstation suffered random crashes (IRQL_NOT_LESS_OR_EQUAL). Action: Analyzed memory dump files (.dmp) using BlueScreenView. Traced the kernel panic to missing Intel Thermal Framework drivers. Result: Eliminated crashes by deploying OEM-specific chipset drivers.

Scenario: A compromised USB installer dropped a persistent Trojan into System32 protected by TrustedInstaller. Action: Identified the unsigned payload and used CLI commands (takeown, icacls) to escalate privileges and override system file protections. Result: Successfully eradicated the malware without requiring a system re-image.


*Education Google cybersecurity certificate comptia A+ linkedin learning certificate Pathway connect certificate

  • [System Administration:ENSIGN_COLLEDGE 2025-28]

Visitor Count

Popular repositories Loading

  1. EgereDavid EgereDavid Public

    My IT Support & Cybersecurity Portfolio – Case Studies & Projects.

    1

  2. DNS-Connectivity-Log DNS-Connectivity-Log Public

    Diagnosing and resolving 'Connected but No Internet' DNS errors.

  3. Windows-Security-Audit- Windows-Security-Audit- Public

    Forensic audit of Windows endpoints using Sysinternals Autoruns and VirusTotal to detect malware persistence and unsigned drivers.

  4. Windows-Kernel-BSOD-Analysis Windows-Kernel-BSOD-Analysis Public

    Diagnosing & Resolving Critical Blue Screen (BSOD) Errors

  5. -Malware-and-Remediation- -Malware-and-Remediation- Public

    Manual removal of a persistent Trojan payload from System32 using CLI privilege escalation (takeown, icacls) and forensic static analysis.

  6. network-traffic-analysis-firewall network-traffic-analysis-firewall Public

    Auditing active network endpoints (TCP/UDP) and implementing Firewall Access Control Lists (ACLs) to block unauthorized services