Report this freelancer

Jefferson Joojo Yankson

Security Analyst
15 November 2004
  • Successful Projects
    0
  • Services Delivered
    0
  • Completed Services
    0
  • Services Pending
    0

Freelancer Information

PERSONAL SUMMARY

I am an IT student with three years of hands-on experience in core security technologies, I am passionate about safeguarding digital landscapes. I specialize in security architecture and engineering, applying advanced security measures and tools to protect people, data, and networks from evolving cyber threats. My goal is to contribute to building secure, resilient systems through proactive security solutions and continuous improvement.

EDUCATION

Bachelor Of Science in Information Technology Feb 2023 - July 2026

Ghana Communication Technology University - Accra, Ghana

CERTIFICATIONS

Google Professional Cybersecurity Certificate, Harvard cs50 Feb 2025 - Present

WORK EXPERIENCE

IT Technician at a Non-Profit Organization (Church) Sept 2023 - Aug 2024

● Helped with networking protocols such as L1 and L2

● Developed and deployed a website to help members keep track of service (skills used: HTML, CSS, PHP, and FIGMA).

TECHNICAL SKILLS

Operating Systems: Linux (Ubuntu, Kali), Windows
Cybersecurity Tools: Wireshark, Nmap, OpenSSL, Tcpdump, Suricata, Splunk
Networking: Network architecture & security hardening
Scripting & Programming: Python, Bash, SQL
Security Concepts: INFOSEC, Hashing, IAM, AAA, Defensive Security.
Frameworks & Standards: NIST SP 800-53: AC-6, MITRE ATT&CK, PCI DSS


Freelancer Education

B
2022-2026 Bachelors Degree
Ghana Telecommunications University

Bsc Information Technology 26'


Awards

C
2025 CS50'S Introduction to Databases with SQL | Havard University
Over the weeks, I learned how to use SQL commands to create, read, update, and delete data. Along the way, I gained insights on 1. SQL commands (DML, DDL, TCL, DQL, DCL) 2. Writing complex SQL queries for effective data retrieval. 3. Balanced tree algorithm & Linear search algorithm. 4. Designing and Optimizing relational databases. 5. ACID (Atomicity, Consistency, Isolation, Durability) 6. Access control. 7. Race conditions, Locks, Prepared statements, SQL injection attacks. 8. SQLite, SQL, and, PostgreSQL. The course covered several advanced topics, offered a good number of skillset problems, and one final project. I developed a fictional database for the English Premier League for my final project. Skill used: SQLite3. Why is this important for my cybersecurity journey? Understanding how attackers exploit vulnerabilities in databases is very important to help detect, and protect against threats. Also, ensuring data is always isolated, secured, and resilient against unauthorized access.
G
2024 - Present Google Professional Cybersecurity Certificate

$18.00 - $18.00 / hr