.png?width=579&height=521&name=Pink%20Maroon%20Minimalist%20Aesthetic%20Simple%20Presentation%20(5).png)
Cyber Security El Paso, Texas
Consuelo Ramirez
If I weren’t pursuing my passion for cybersecurity, I’d be chasing my second love: cooking. But for now, you’ll find me studying for CompTIA Security+ and planning my next cybersecurity conference.
.png?width=1922&height=1081&name=Pink%20Maroon%20Minimalist%20Aesthetic%20Simple%20Presentation%20(2).png)
Skills
- Programming & Scripting: Python, Bash, Java, C/C++, JavaScript, SQL
- Cybersecurity Tools & Frameworks: Kali Linux, Wireshark, Nmap, Suricata, Nessus, Ghidra, IDA Pro, Burp Suite, Volatility, Binwalk, Steghide
- Secure Development & DevOps: Git, GitHub, GitLab, Docker, Flask, pytest, microservice testing, CI/CD pipelines
- System Security & Analysis: Vulnerability scanning, network monitoring, reverse engineering, digital forensics, authentication systems
- Machine Learning & NLP: TensorFlow, Keras, BERT, OpenAI API, cyber data analysis, automation
- Operating Systems: Unix/Linux (Kali, Ubuntu), Windows, Virtual Machines
- Data Visualization: Power BI, Plotly, Excel
- Web & UI Tools: HTML, CSS, Unity, Bootstrap
- Other Skills: Fluent in English and Spanish, AV systems (Extron, Q-SYS), STEM outreach, cybersecurity education experience
Technical Projects
- CWE-ATT&CK Analyzer
- Web Proxy Server Implementation
- Reliable File Transfer Protocol
- Web-Based Authentication System
- Image Classification Using CNNs
Cybersecurity Chatbot for Analyzing Vulnerabilities
I processed large datasets from CWE and ATT&CK using Python to create embeddings and stored them as vectors in a Weaviate database for efficient querying. Leveraging the OpenAI API, I summarized outputs from BERT embeddings to generate concise and simplified query results. I also created interactive visualizations with Plotly to illustrate attack techniques, system weaknesses, and possible mitigations.
Proxy Server Lab
Designed and implemented a Python-based socket program to create a simple HTTP web proxy server. The project focused on understanding how proxy servers intercept, modify, and forward HTTP requests between clients and servers.
Computer Networks: File Transfer Protocol
Created a system that simulated the operation of application layer protocols for reliable file transfers. Implemented error recovery and packet acknowledgment to guarantee successful delivery.
PHP-Based Authentication with Role Control
I developed a PHP-based authentication system with features including password validation, user session management, and role-based access control (admin vs. user). To enhance security, I implemented access control mechanisms, secure privilege escalation for admin users, and safe redirection protocols to prevent URL tampering and unauthorized access.
Image Classification Using CNNs
I trained a Convolutional Neural Network (CNN) using TensorFlow and Keras to classify visually similar images. To enhance performance, I applied regularization techniques, batch normalization, and data augmentation, improving the model’s accuracy and robustness. I fine-tuned hyperparameters and experimented with different architectures to optimize performance and prevent overfitting. Additionally, I compared the CNN’s performance against a logistic regression model, analyzing results based on accuracy, precision, and overall classification effectiveness. This project provided valuable experience in designing, training, and evaluating machine learning models for image classification tasks.
2018 - Present
Professional Experience
-
El Paso, TX Jan 2024 - Present
Teaching Assistant - SWE
University of Texas at El Paso
Assisted in teaching the Software Engineering capstone course in the undergraduate computer science degree.
• Supported course instructor in lecture preparation and delivery.
• Clarified complex concepts for over 100 students during lectures, held office hours, and provided feedback on project deliverables.
• Served as the interface between student teams and clients, ensuring clear and efficient communications.
-
Livermore, CA May - Aug 2024
Cybersecurity - Graduate Intern - Cyber and Critical Infrastructure Summer Institute
Lawrence Livermore National Security
Developed a Python library composed of pydantic module files as a centralized repository to reduce dependencies across projects.
• Created scripts to compare/modify/update imports, automatically manage dependencies and resolve conflicts automating 15+ hours of manual work per sprint across teams.
• Set up a GitLab CI/CD pipeline to automate nightly updates, including running tests and generating detailed reports on changes made to repositories.
-
Richland, WA May - Aug 2023
Visiting Researcher Intern
Department of Energy Omni Technology Alliance/Pacific Northwest National Laboratory
Designed and developed an immersive educational game utilizing Unity, highlighting the critical role of cybersecurity in hydropower systems. The game effectively communicated complex concepts to diverse audiences, promoting awareness and understanding of cybersecurity challenges within the hydropower sector.
Conducted research on IoT devices and their communication protocols, contributing insights to the evolving landscape of IoT technologies.
-
El Paso, TX Aug 2021 - 2023
Student Leadership Advisor (SLA)
UTEP Learning Environments
Oversaw over 30 student employees, facilitating communication with full-time faculty mentors to ensure smooth collaboration and alignment on expectations.
• Efficiently managed and allocated campus-wide tech support calls, ensuring prompt and effective resolution of technical issues.
• Mentored and trained student staff in audio-visual systems, troubleshooting classroom technology, workshop development, and fabrication equipment.
-
White Sands Missile Range,NM Jun - Aug 2022
STEM Intern
Test Research Management Center - Broadleaf
Developed a user-guided interface utilizing Power BI, Power Apps, and Excel to effectively present mission support resource data, enhancing accessibility and user experience.
• Created 3D airspace model, resulting in a 25% improvement in airspace deconfliction. This model enhanced visualization and decision-making processes.
Eyebrow Lorem
Inspirational Speakers
Media
Quisque volutpat mattis eros. Nullam malesuada erat ut turpis.