About Me

Hello! I'm Gavin Oxley, a cybersecurity and network engineering student at Purdue University. I currently hold CompTIA Sec+, Net+ A+, INE eJTP, and Microsoft AZ-900 certifications. I'm interested in security, networking and information assurance.

Through my internships at ReliaQuest and Purdue Federal Credit Union, I've gained practical experience with enterprise security tools, threat detection, and network infrastructure deployment. Additionally, I've worked with technologies such as Splunk, CrowdStrike, Azure Sentinel, and various networking platforms.

My goal is to take the knowledge I've gained at Purdue and apply it in a full-time professional setting. Please feel free to reach out to me at gavinoxley4@gmail.com or download a copy of my resume above. Thank you!

Core Competencies

Security Technologies

  • Splunk, Azure Sentinel, Google Security Operations
  • CrowdStrike Falcon, SentinelOne, ThreatLocker
  • IBM QRadar, Microsoft Defender
  • SIEM/EDR Rule Engineering
  • Vulnerability Assessment & Penetration Testing

Networking

  • Cisco IOS, Junos OS, OSPF
  • VLANs, TCP/IP, IPv4/IPv6
  • Palo Alto Firewalls, pfSense
  • Wireshark, Network Monitoring
  • DNS, DHCP, Network Architecture

Cloud & Virtualization

  • Microsoft Azure (Entra ID, Monitor, Defender)
  • AWS, vSphere, VirtualBox
  • Office 365, Azure Migrations
  • Virtual Network Configuration
  • Cloud Security Architecture

Programming & Administration

  • Python, PowerShell, KQL, SPL, SQL
  • Active Directory, SCCM
  • Linux (Kali, Rocky, Ubuntu), macOS
  • Ansible, Infrastructure Automation
  • Endpoint Security Management

Education

Bachelor of Science in Cybersecurity

Bachelor of Science in Network Engineering

Expected Graduation: May 2026

Purdue University - West Lafayette, Indiana

Professional Experience

Security Analyst Intern

Jun 2025 – Aug 2025

ReliaQuest - Las Vegas, Nevada

• Worked across several EDR/SIEM technologies (Splunk, Crowdstrike, Google Chronicle, Microsoft Sentinel & Defender)

• Investigated and remediated over 100 potential threats in 90+ different customer environments over 6 week period

• Engineered SIEM & EDR detection rules to reduce false positive alert rate, increasing customer visibility by over 80%

• Programmed fixes for 50+ existing rules in languages such as KQL, AQL, SPL and SQL to correct detection logic

• Collaborated with network engineering department to shadow deployment of 20+ Palo Alto to Azure client firewall migrations

IT Infrastructure & Security Intern

May 2024 – Present

Purdue Federal Credit Union - West Lafayette, Indiana

• Led employee hardware refresh initiative, building new laptops and conducting 1-on-1 meetings to deploy over 100 upgrades

• Utilized technologies like RDP & Remote Control to resolve 70+ technical support tickets for users across various departments

• Assisted with infrastructure deployment (hardware & software configuration) of printers, ATMs & PCS in new branch

• Programmed Powershell script to automate installation of endpoint security software in post-PXE boot imaging process

• Facilitated 25+ Microsoft 365 & Windows 11 user account migrations from legacy Windows and Office software in Azure

Projects

OSPF Router Lab

Cisco, Juniper, HP/Aruba

• Implemented OSPF routing across a 10-device lab network (Cisco, Juniper, and HP/Aruba) to build a link-state database

• Configured and deployed a centrally managed terminal server with an ASYNC-16 connection to device console ports

• Integrated core network services including DNS, NTP, and DHCP for realistic enterprise operations, while assigning and managing both IPv4 and IPv6 addressing across multiple VLANs

Nmap Vulnerability Scanner

Python

• Built a Python script that automated Nmap scans to identify live hosts, open ports, and running services across target subnets

• Parsed raw Nmap XML output using python-nmap to extract service versions and potential misconfigurations

• Generated JSON and HTML reports summarizing findings, including host IP, port state and running service details

Enterprise Network Infrastructure Lab

pfSense, Windows Server, vSphere

• Implemented BIND DNS servers in a public DMZ for external name resolution, integrating with internal DNS and external resolvers to simulate real-world enterprise DNS architecture

• Built and secured a multi-zone enterprise network lab using pfSense as a perimeter firewall with WAN, DMZ, HQ capabilities

Certifications

Current Certifications

• Azure Fundamentals (AZ-900) - Microsoft

• CompTIA Security+, CySA+, Network+, A+ - CompTIA

• Junior Penetration Tester (eJPT) - INE

In Progress

• Cisco Certified Networking Associate (CCNA) - Cisco

Technical Skills

Networking

Cisco IOS, Junos OS, OSPF, VLANs, TCP/IP, IPv4/IPv6, Wireshark, DNAT, WLC, DHCP, DNS, IPnIP

Cloud

Microsoft Azure (Entra ID, Monitor, Defender, VNet), AWS, vSphere, VirtualBox, VMFusion, Office 365

Security

Splunk, Azure Sentinel, Google Security Operations, IBM QRadar, CrowdStrike Falcon, SentinelOne, Threatlocker

Administration

Active Directory, SCCM, PowerShell, Ansible, Linux (Kali, Rocky, Ubuntu), macOS, SMB/NFS

Featured Projects

ls ~/projects/cybersecurity/

Here are the cybersecurity and networking projects I've worked on:

OSPF Router Lab

Implemented OSPF routing across a 10-device lab network (Cisco, Juniper, and HP/Aruba) to build a link-state database. Configured and deployed a centrally managed terminal server with an ASYNC-16 connection to device console ports, while integrating core network services including DNS, NTP, and DHCP for realistic enterprise operations.

Cisco IOS Juniper HP/Aruba OSPF VLANs

Nmap Vulnerability Scanner

Built a Python script that automated Nmap scans to identify live hosts, open ports, and running services across target subnets. Parsed raw Nmap XML output using python-nmap to extract service versions and potential misconfigurations, generating JSON and HTML reports with detailed findings.

Python Nmap XML Parsing Vulnerability Assessment

Enterprise Network Infrastructure Lab

Implemented BIND DNS servers in a public DMZ for external name resolution, integrating with internal DNS and external resolvers to simulate real-world enterprise DNS architecture. Built and secured a multi-zone enterprise network lab using pfSense as a perimeter firewall with WAN, DMZ, and HQ capabilities.

pfSense Windows Server vSphere BIND DNS Network Security