REYNALDO
RODRIGUEZ

>

Cybersecurity B.S. candidate at FIU with hands-on experience in vulnerability analysis, red team testing, secure lab environments, and system troubleshooting. Driven by the gap between what scanners catch and what humans find.

reynaldo@kali: ~

01. whoami

I'm Reynaldo — a senior Cybersecurity student at Florida International University (GPA 3.7, Dean's List) graduating August 2026. Bilingual in English and Spanish, based in Miami.

My focus is the overlap between automated scanning and manual testing. On my senior capstone I led a 5-person team as Cloud Security Architect and we showed ~40% of findings — including 3 of 4 Criticals — were only caught by humans. Tools tell you where to look; analysts tell you what it means.

When I'm not in class I run SoulHomeLab, a self-hosted server / networking playground where I break things on purpose so I can fix them on purpose.

locationMiami, FL
schoolFIU — B.S. Cybersecurity
graduationAug 2026
gpa3.7 / Dean's List
interestsvuln mgmt, SOC, infosec, SIEM
languagesEnglish, Spanish

02. projects

Cloud Security Architect & Team Lead

VulNerd // Spring 2026 · FIU

DockerRaspberry Pi 5DVWA NessusTailscaleMariaDB

AI-powered vulnerability analysis & compliance reporting (NIST 800-53, PCI-DSS). I led 5 teammates, owned the cloud / lab architecture, and ran the testing methodology.

  • Built lab environment supporting an AI tool for vulnerability analysis & compliance reporting against NIST 800-53 and PCI-DSS.
  • Deployed DVWA in Docker on a Raspberry Pi 5 with MariaDB at Security Level Low so every vuln class was fully exploitable for the team.
  • Locked lab access behind Tailscale VPN — zero public exposure, team-only access enforced for the entire project lifecycle.
  • Ran Nessus scans (Basic Network, Credentialed, Web App, Advanced Dynamic) and supported red-team testing across 8 modules: SQLi, XSS, Command Injection, and more.
  • Surfaced the headline finding: ~40% of vulnerabilities — incl. 3 of 4 Criticals — were only caught manually, proving the layered approach over automation alone.
5
person team led
8
attack modules
40%
findings manual-only
0
public exposure
Personal Home Server & Networking Lab

SoulHomeLab // Ongoing

UbuntuDockerPortainer CloudflareTailscaleAdGuard

A live environment to break, fix, and learn. Self-hosted services behind zero public ports.

  • Ubuntu host running Docker containers — Plex, Sonarr, Nextcloud, Vaultwarden — orchestrated through Portainer, with AdGuard as network-level DNS filtering.
  • Configured Cloudflare + Tailscale for remote access with no public ports, and Duplicati for encrypted automated backups across services.
  • Organized storage with separate mount paths for downloads / movies / shows across multiple drives.
  • Monitored uptime with Uptime Kuma and debugged real-world issues: DNS conflicts, port collisions, container-to-container networking.
10+
services hosted
100%
tunneled access
rabbit holes
Blue Team / Detection Engineering

SOC Simulation // In progress

SplunkWiresharkSysmonMITRE ATT&CK

A personal SOC bench — ingesting endpoint & network telemetry into Splunk, writing detections, and walking through realistic incident scenarios end-to-end.

  • Ingesting Sysmon + Windows Event Logs into Splunk to build alerts on suspicious process trees and persistence.
  • Capturing PCAPs with Wireshark and triaging traffic against MITRE ATT&CK techniques.
  • Documenting full IR playbooks: identify → contain → eradicate → recover → learn.
status writing detections & case studies — public writeups landing soon.
What I'm building next

The Roadmap // 2026

  • cert CompTIA Security+ & Network+ — Aug 2026
  • project Phishing analysis lab — sandbox + URL/headers triage
  • project Home IDS w/ Suricata feeding into Splunk
  • writing Blog series on red vs. blue findings overlap
  • goal Land entry-level cybersecurity / SOC analyst role post-graduation

03. skills

Security Tools

06
  • Splunk
  • Nessus
  • Wireshark
  • Nmap
  • Metasploit
  • Burp Suite
$ 6 tools · armed

OS & Platforms

06
  • Kali Linux
  • Ubuntu
  • Windows
  • Docker
  • Raspberry Pi
  • VirtualBox
$ 6 platforms · mounted

Languages

04
  • Python
  • Bash
  • Java
  • C
$ 4 languages · ready

Concepts

10
  • Networking
  • TCP/IP
  • DNS
  • VPN
  • Vulnerability Scanning
  • Log Analysis
  • SIEM
  • Linux Admin
  • Container Networking
  • Remote Access Security
$ 10 domains · indexed

04. experience

  1. Nov 2019 — Jul 2022

    Mobile Expert @ T-Mobile

    • Identified & escalated suspicious account activity following security and identity verification procedures.
    • Educated customers on account security, MFA, phishing awareness, and SIM-swap scam prevention.
    • Diagnosed device & network connectivity issues with systematic troubleshooting across iOS / Android.
  2. Aug 2019 — Oct 2019

    Sales Representative @ AT&T

    • Maintained customer records in CRM systems in compliance with data privacy procedures.
    • Translated technical info for customers across a wide range of technical fluency.
  3. Mar 2017 — Aug 2019

    Sales Representative @ MetroPCS

    • Assisted with device setup, activation, and troubleshooting across Android & iOS.
    • Consistently met sales goals in a fast-paced retail environment.

05. contact

~/contact $ ./reach_out.sh

Open to entry-level cybersecurity, vulnerability management, SOC, and information security roles, plus internships and interesting conversations. I reply.