[ OK ] Loaded kernel: cybersecurity.degree.v4.0 [ OK ] Mounted: 4 years of coursework, labs & internships [ WARN ] Graduation imminent — seeking first full-time role [ OK ] Status: available for immediate hire · September 2026

Cybersecurity Graduate · Class of 2026

SAMUEL ROULSTONE Security Analyst & Aspiring Pentester

B.S. in Cybersecurity — finishing strong and ready to contribute from day one. Built real skills through university cyber range labs, Cisco Packet Tracer network simulations, and a CTF habit I refuse to kick.

View My Work Download Resume Contact Me
// Student Profile
Degree B.S. Cybersecurity
University Southern New Hampshire University
Expected Graduation September 2026
GPA 3.8 / 4.0 — Dean's List
Available Full-Time · September 2026
01

About Me

bash — student_profile.sh
student@snhu:~$ cat about.txt Hey — I'm Samuel, a cybersecurity student at SNHU finishing my degree and genuinely excited to start my career. I care about understanding how attacks work so I can build smarter defenses — not just follow a checklist.
student@snhu:~$ cat interests.txt Network Security | Penetration Testing | Application Security Threat Hunting | Malware Analysis | Incident Response
student@snhu:~$ cat target_roles.txt Junior Penetration Tester Security Engineer (Entry-Level) Vulnerability Analyst Network Security Analyst
student@snhu:~$
02

Education

Bachelor of Science
in Cybersecurity

Southern New Hampshire University · Manchester, NH (Online)

Expected September 2026 GPA: 3.8 / 4.0 Dean's List Concentration: Offensive Security

Rigorous coursework in network security, cryptography, and ethical hacking — backed by hands-on labs and real-world simulations. Built practical experience through TryHackMe learning paths, Cisco Packet Tracer network labs, and competitive hackathon participation.

// Relevant Coursework

Network Security Ethical Hacking Cryptography Digital Forensics Malware Analysis Secure Coding Cloud Security Incident Response OS Security Risk Management

// Honors & Activities

Dean's List — 6 consecutive semesters Competed in 4 Collegiate CTF events NSA GenCyber Program participant US Navy Hackathon Participant TryHackMe — Top 10% Global Ranking
03

Projects

IT-212 · Lab Report
Network Design

Fayetteville Branch Office Network Design

Designed a full enterprise network for a new 50-person branch office: fiber ISP selection, star topology, VLANs, site-to-site VPN, QoS for video conferencing, and cloud print management.

VLANsVPNQoSOSI ModelAT&T Fiber
CYB-210 · Packet Tracer
Routing & Subnetting

Multi-Subnet Routing & NAT Configuration

Configured static and RIP dynamic routing across three subnets in Cisco Packet Tracer. Set up NAT/PAT, DHCP, DNS, and verified end-to-end connectivity with ping tests across all network segments.

Cisco Packet TracerStatic RoutingRIPNAT/PATDHCP
CYB-210 · Packet Tracer
Network Modification

Network Reconfiguration & VLAN Lab

Reconfigured an existing network by updating IP addressing, default gateways, and DHCP/DNS settings across admin workstations and printers. Documented changes with screenshots of VLAN tables, wireless settings, and ping results.

Cisco Packet TracerVLANsDHCPDNSNAT
CYB-240 · Lab Report
Vulnerability Assessment

Application Vulnerability Summary Report

Identified and analyzed two critical CVSS 10.0 vulnerabilities — a phpMyAdmin end-of-life installation and an unsupported Ubuntu OS — documented real-world exploit history and applied remediations.

NessusCVSSphpMyAdminLinuxPatch Management
CYB-230 · Lab Report
OS Security

Healthcare Network Security Assessment (Helios)

Assessed a healthcare insurer's network for HIPAA compliance gaps. Identified open Wi-Fi with no authentication and unpatched workstations, then recommended WPA3, 802.1X/RADIUS, and centralized patch management.

HIPAAWPA3802.1XWSUSVLAN Segmentation
CYB-220 / CYB-240 · Reports
Application & Network Security

IDS Evaluation & App Security Recommendations

Two linked reports: evaluated NIDS vs NIPS for a small organization using Principle of Least Privilege; and identified Sensitive Data Exposure and Broken Authentication in a healthcare web app with OWASP-based remediation.

NIDSOWASP Top 10HTTPS/TLSRBACMITRE ATT&CK
04

Experience & Labs

2024 US Navy Hackathon

US Navy Cybersecurity Hackathon

  • Competed in a Navy-sponsored cybersecurity challenge focused on real-world offensive and defensive scenarios
  • Collaborated with a team to identify vulnerabilities in simulated naval network infrastructure
  • Applied skills in network analysis, threat identification, and rapid incident response under timed conditions
  • Gained exposure to defense-sector security requirements and mission-critical system protection
2023 – Present TryHackMe Self-Study

TryHackMe Learning Paths & CTF Rooms

  • Completed multiple structured learning paths including Pre-Security, SOC Level 1, and Jr. Penetration Tester
  • Practiced hands-on skills across 60+ rooms covering web exploitation, network analysis, OSINT, and forensics
  • Ranked in the top 10% of global TryHackMe users with consistent daily streaks
  • Applied MITRE ATT&CK framework knowledge to map room scenarios to real adversary techniques
2023 – Present SNHU Coursework Academic Lab

University Cyber Lab Practicals

  • Completed structured lab exercises across network security, cryptography, and digital forensics courses
  • Built and configured multi-device network topologies using Cisco Packet Tracer for graded practicals
  • Analyzed packet captures, firewall logs, and system artifacts as part of forensic and IR coursework
2022 – Present Independent Self-Directed

Home Lab & CTF Practice

  • Maintained a personal virtual lab environment for testing tools and practicing attack/defense techniques
  • Participated in collegiate and open CTF competitions, building experience in web, crypto, and forensics challenges
  • Studied NSA GenCyber program curriculum and applied concepts to self-directed research projects
05

Skills & Tools

Offensive Security
Penetration TestingProficient
Metasploit FrameworkProficient
Burp SuiteProficient
Nmap / NessusProficient
Exploit DevelopmentLearning
Defensive / Blue Team
SIEM (Splunk / ELK)Proficient
Incident ResponseDeveloping
Wireshark / ZeekProficient
MITRE ATT&CKFamiliar
Threat IntelligenceLearning
Technical Foundation
Python ScriptingProficient
Linux / BashProficient
Networking (TCP/IP)Strong
Virtualization (VMware)Proficient
Cloud Basics (AWS)Familiar
06

Certifications

↻ In Progress
Sec+
CompTIA Security+ (SY0-701)
CompTIA · Est. 2026
↻ In Progress
Net+
CompTIA Network+ (N10-009)
CompTIA · Est. 2027
↻ In Progress
CC
Certified in Cybersecurity
(ISC)² · Est. 2027
↻ In Progress
eJPT
Junior Penetration Tester
eLearnSecurity · Est. 2027
↻ In Progress
OSCP
Offensive Security Certified Professional
Offensive Security · Est. 2027
↻ In Progress
CySA+
Cybersecurity Analyst+
CompTIA · Est. 2027
07

Let's Connect

Looking for My First Role.

I'm actively interviewing for entry-level security positions — junior pentester, security engineer, or vulnerability analyst roles. I bring real hands-on experience, a growth mindset, and genuine passion for this field. Let's talk.


Available to start: September 2026