Matthew Nunez

Cybersecurity & IT Professional

Cybersecurity professional with a passion for hands-on learning

About Me

Cybersecurity professional serving as an IT Security Program Specialist with the State of Tennessee, where I focus on disaster recovery planning, business impact analysis, and NIST SP 800-53 compliance. I hold a B.S. in Cybersecurity from Missouri Western State University and bring a disciplined, team-first mindset shaped by years as a student-athlete. Driven by a genuine passion for cybersecurity, I'm committed to continuously sharpening my skills and making a real impact in the field.

When I'm away from the keyboard, I enjoy fishing, staying active at the gym, and watching movies. Activities that help me recharge and bring fresh perspective to technical challenges.

Security

  • Network Security
  • Cyber Threat Intelligence (CTI)
  • SIEM/Log Analysis
  • Pishing Analysis

System Administration

  • Linux/Windows Server
  • Virtualization (Proxmox/VMware)
  • Networking (TCP/IP, VLANs)
  • Cloud (AWS)

Tools & Tech

  • Docker/Kubernetes
  • Python Scripting
  • Active Directory
  • Splunk
  • Power BI

Experience

May 2025 - Present

IT Secuirty Program Specialist

State of Tennessee

  • Coordinate and manage annual Business Impact Analyses (BIAs) with multiple agency partners to identify critical systems, recovery priorities, and operational risks
  • Develop, maintain, and update Disaster Recovery (DR) and Contingency Plans in alignment with organizational requirements and NIST SP 800-53
  • Ensure organizational compliance with NIST SP 800-53 controls related to contingency planning, Recovery Time Objective (RTO) / Recovery Point Objective (RPO) Analysis
  • Produce clear, concise dashboards, reports, and executive-level presentations for agency partners and auditors to communicate risk posture, gaps, and remediation status
  • Plan, coordinate, and execute functional and tabletop disaster recovery tests, validating recovery procedures, communication workflows, and system restoration capabilities.
February 2024 – July 2024

IT Infrastructure Intern

Boehringer Ingelheim

  • Provided technical support and managed data center operations, gaining skills in server installation, networking, and troubleshooting.
  • Verified system configurations for accuracy, troubleshooting issues related to endpoint enrollments, data backups, and network setups.
  • Led a file organization project for 400+ employees, enhancing project management and data analysis skills
  • Improved communication skills through staff coordination and accurate data collection

Certifications

🔒

Security+

CompTIA

2024
🌐

Network+

CompTIA

2025
💻

A+

CompTIA

2024
🔧

Cisco Certified Support Technician

Cisco Cybersecurity

2025
🔍

SecAI+

CompTIA

2025
☁️

AWS Solutions Architect Associate

Amazon Web Services

In Progress

Projects

🛡️ TryHackMe SOC Level 1

Completed (Certificate earned)

Comprehensive hands-on training path focused on Security Operations Center fundamentals. Completed modules covering cyber defense frameworks, network security monitoring, threat intelligence, incident response procedures, and SIEM analysis using industry-standard tools.

SIEM Splunk Wireshark IDS/IPS Threat Hunting Incident Response
View Details
  • Network Analysis: Packet capture analysis with Wireshark, identifying malicious traffic patterns and suspicious network behavior
  • SIEM Operations: Log analysis and correlation using Splunk, creating custom queries and alerts for threat detection
  • Threat Intelligence: Understanding attack frameworks (MITRE ATT&CK), analyzing indicators of compromise (IOCs), and threat actor TTPs
  • Incident Response: Hands-on practice with incident handling procedures, evidence collection, and security event triage
  • Security Tools: Experience with Snort, Zeek, Suricata for network intrusion detection and prevention

🔐 Microsoft Entra ID Administration Lab

Completed

Hands-on identity and access management lab simulating real-world IT administration for a small law firm environment. Conducted on Azure Free Tier covering the full scope of tasks an on-call IT technician would encounter managing Microsoft Entra ID.

Microsoft Entra ID Azure IAM Conditional Access RBAC MFA
View Details
  • User Lifecycle Management: Provisioned, disabled, deleted, and restored user accounts simulating onboarding, leave of absence, and offboarding workflows including secure password resets
  • Group Management: Created and managed security groups with assigned membership, documented dynamic membership rules as a P1 enterprise feature
  • Roles and Permissions: Assigned and revoked built-in Entra roles including Helpdesk Administrator and User Administrator following least privilege principles to minimize attack surface
  • Conditional Access and MFA: Documented Conditional Access policy configuration and MFA enforcement strategies including the distinction between free Security Defaults and P1 Conditional Access policies
  • Incident Investigation: Investigated simulated security incidents using sign-in logs and audit logs, identified VPN false positives, and traced exact account changes through modified properties
  • Documentation: Fully documented on GitHub including objectives, steps, licensing considerations, and real-world context for each lab task

Get In Touch