About Me
Hello! I'm Gavin Oxley, a cybersecurity and network engineering student at Purdue University. I currently hold CompTIA Sec+, Net+ A+, INE eJTP, and Microsoft AZ-900 certifications. I'm interested in security, networking and information assurance.
Through my internships at ReliaQuest and Purdue Federal Credit Union, I've gained practical experience with enterprise security tools, threat detection, and network infrastructure deployment. Additionally, I've worked with technologies such as Splunk, CrowdStrike, Azure Sentinel, and various networking platforms.
My goal is to take the knowledge I've gained at Purdue and apply it in a full-time professional setting. Please feel free to reach out to me at gavinoxley4@gmail.com or download a copy of my resume above. Thank you!
Core Competencies
Security Technologies
- Splunk, Azure Sentinel, Google Security Operations
- CrowdStrike Falcon, SentinelOne, ThreatLocker
- IBM QRadar, Microsoft Defender
- SIEM/EDR Rule Engineering
- Vulnerability Assessment & Penetration Testing
Networking
- Cisco IOS, Junos OS, OSPF
- VLANs, TCP/IP, IPv4/IPv6
- Palo Alto Firewalls, pfSense
- Wireshark, Network Monitoring
- DNS, DHCP, Network Architecture
Cloud & Virtualization
- Microsoft Azure (Entra ID, Monitor, Defender)
- AWS, vSphere, VirtualBox
- Office 365, Azure Migrations
- Virtual Network Configuration
- Cloud Security Architecture
Programming & Administration
- Python, PowerShell, KQL, SPL, SQL
- Active Directory, SCCM
- Linux (Kali, Rocky, Ubuntu), macOS
- Ansible, Infrastructure Automation
- Endpoint Security Management
Education
Bachelor of Science in Cybersecurity
Bachelor of Science in Network Engineering
Expected Graduation: May 2026
Purdue University - West Lafayette, Indiana
Professional Experience
Security Analyst Intern
Jun 2025 – Aug 2025
ReliaQuest - Las Vegas, Nevada
• Worked across several EDR/SIEM technologies (Splunk, Crowdstrike, Google Chronicle, Microsoft Sentinel & Defender)
• Investigated and remediated over 100 potential threats in 90+ different customer environments over 6 week period
• Engineered SIEM & EDR detection rules to reduce false positive alert rate, increasing customer visibility by over 80%
• Programmed fixes for 50+ existing rules in languages such as KQL, AQL, SPL and SQL to correct detection logic
• Collaborated with network engineering department to shadow deployment of 20+ Palo Alto to Azure client firewall migrations
IT Infrastructure & Security Intern
May 2024 – Present
Purdue Federal Credit Union - West Lafayette, Indiana
• Led employee hardware refresh initiative, building new laptops and conducting 1-on-1 meetings to deploy over 100 upgrades
• Utilized technologies like RDP & Remote Control to resolve 70+ technical support tickets for users across various departments
• Assisted with infrastructure deployment (hardware & software configuration) of printers, ATMs & PCS in new branch
• Programmed Powershell script to automate installation of endpoint security software in post-PXE boot imaging process
• Facilitated 25+ Microsoft 365 & Windows 11 user account migrations from legacy Windows and Office software in Azure
Projects
OSPF Router Lab
Cisco, Juniper, HP/Aruba
• Implemented OSPF routing across a 10-device lab network (Cisco, Juniper, and HP/Aruba) to build a link-state database
• Configured and deployed a centrally managed terminal server with an ASYNC-16 connection to device console ports
• Integrated core network services including DNS, NTP, and DHCP for realistic enterprise operations, while assigning and managing both IPv4 and IPv6 addressing across multiple VLANs
Nmap Vulnerability Scanner
Python
• Built a Python script that automated Nmap scans to identify live hosts, open ports, and running services across target subnets
• Parsed raw Nmap XML output using python-nmap to extract service versions and potential misconfigurations
• Generated JSON and HTML reports summarizing findings, including host IP, port state and running service details
Enterprise Network Infrastructure Lab
pfSense, Windows Server, vSphere
• Implemented BIND DNS servers in a public DMZ for external name resolution, integrating with internal DNS and external resolvers to simulate real-world enterprise DNS architecture
• Built and secured a multi-zone enterprise network lab using pfSense as a perimeter firewall with WAN, DMZ, HQ capabilities
Certifications
Current Certifications
• Azure Fundamentals (AZ-900) - Microsoft
• CompTIA Security+, CySA+, Network+, A+ - CompTIA
• Junior Penetration Tester (eJPT) - INE
In Progress
• Cisco Certified Networking Associate (CCNA) - Cisco
Technical Skills
Networking
Cisco IOS, Junos OS, OSPF, VLANs, TCP/IP, IPv4/IPv6, Wireshark, DNAT, WLC, DHCP, DNS, IPnIP
Cloud
Microsoft Azure (Entra ID, Monitor, Defender, VNet), AWS, vSphere, VirtualBox, VMFusion, Office 365
Security
Splunk, Azure Sentinel, Google Security Operations, IBM QRadar, CrowdStrike Falcon, SentinelOne, Threatlocker
Administration
Active Directory, SCCM, PowerShell, Ansible, Linux (Kali, Rocky, Ubuntu), macOS, SMB/NFS
Featured Projects
ls ~/projects/cybersecurity/
Here are the cybersecurity and networking projects I've worked on:
OSPF Router Lab
Implemented OSPF routing across a 10-device lab network (Cisco, Juniper, and HP/Aruba) to build a link-state database. Configured and deployed a centrally managed terminal server with an ASYNC-16 connection to device console ports, while integrating core network services including DNS, NTP, and DHCP for realistic enterprise operations.
Nmap Vulnerability Scanner
Built a Python script that automated Nmap scans to identify live hosts, open ports, and running services across target subnets. Parsed raw Nmap XML output using python-nmap to extract service versions and potential misconfigurations, generating JSON and HTML reports with detailed findings.
Enterprise Network Infrastructure Lab
Implemented BIND DNS servers in a public DMZ for external name resolution, integrating with internal DNS and external resolvers to simulate real-world enterprise DNS architecture. Built and secured a multi-zone enterprise network lab using pfSense as a perimeter firewall with WAN, DMZ, and HQ capabilities.