Nicholas Giarman
Giarman@protonmail.com
I'm a UX designer and IT tech with a professional curiosity in Cyber Security




CompTIA Security Plus: "HMZEFH5TJBFEQ93X" https://www.credly.com/badges/c76cf09d-51ae-4568-8041-e9d71d9bbcff/public_url
CompTIA Network Plus: Migrating verification from old email address.
Google Cybersecurity Professional Certificate: https://www.coursera.org/account/accomplishments/specialization/H2WKGYEQSA8W
-----------------------------------------------------------------------------------------------------------
OffSec Discord Club
I produced, presented, and recorded educational content in OffSec Club, which is a discord group with the tagline "Have fun learning about securing stuff!"
Originally started as a college club, OffSec grew as we started accepting non-students to the club and posting recordings to YouTube. Our most popular Temple of PWN series teaches viewers a solid security foundation and presents practical examples of attacks.

https://www.youtube.com/@offsecclub5344/videos


Weber State University BITS Club
BITS was a club at Weber State University for students interested in CS and IT. It was a great way for students from different majors to come together and learn.
- Scheduling, hosting, and facilitating talks from local tech groups: Mongo DB, Linux Suse, and Dimensions 3d.
- Participating in a weekly forum focused on emerging technologies.
- Printing in the 3d printing lab (and fixing the printers...).
We also had two small coding contests and various seminars. It was an enriching and rewarding experience.



Intel and Reconnaissance
I'm interested in emerging data breaches and new malware. I like ransomfeed.it and the privacy affairs ransomware database. I may set up automated feeds to notify me of large data dumps, but I've been content occasionally and casually browsing underground forums and public breach archives for cybersecurity research and threat intelligence.
It’s interesting and fun to explore open source intelligence because you can track real world cyber activity and see threats evolve in real time. I haven’t had a reason to dig in since college, but in theory, I could use tactics like monitoring GitHub leak repositories, Pastebin archives, and security mailing lists to follow malware indicators, suspicious IPs, and newly disclosed vulnerabilities.

BugBounty amateur "Participant"
I'm not very active on here anymore, and bug bounty hunting isn't nearly as profitable as it was just back in ~2019, but it's something that interests me. Here's my account: https://bugcrowd.com/SevenLime

Giarman@protonmail.com