Hi, I'm Biruk 👋

I'm a |

Security+ Certified | Secret Clearance | Cybersecurity |
Cloud | AI | Passionate About Tech & Problem-Solving

Loading
0%

About Me

Biruk Aregu
Open to Work
biruk@portfolio:~/about
$ cat journey.txt
I came to the United States from Ethiopia with a dream built on perseverance and faith. My journey started with humble beginnings, driving a taxi while dedicating countless nights to studying and building a new life through education and technology.
$ cat career.txt
Through determination, I earned my Bachelor's degree in Computer and Information Sciences and built a career as an IT Professional specializing in Cybersecurity, Cloud Solutions, and Technical Support.
$ cat passion.txt
I'm also passionate about Artificial Intelligence and continuously explore emerging tools, from intelligent automation to cloud-based integrations. Whether strengthening cybersecurity, optimizing cloud infrastructure, or leveraging AI, I bring curiosity and adaptability to every challenge.
$

Impact & Capabilities

Technical expertise focused on building and implementing cybersecurity solutions

0
Security Projects Built
0
Attack Types Monitored
0
Phishing Scenarios Created
0
Technologies Mastered

Education

Bachelor of Science in Computer Information Science

Harrisburg University of Science and Technology
Aug 2020 - May 2022 Philadelphia, PAGPA: 3.96/4.0
  • Minor in Cybersecurity
  • Summa Cum Laude Honors
  • President's List Recognition
  • Advanced coursework in Programming, Cybersecurity, and Networking

Associate in Applied Science — Computer Information Systems

Community College of Philadelphia
Sep 2018 - Aug 2020 Philadelphia, PAGPA: 3.81/4.0
  • Dean's List Recognition
  • Academic Excellence Award
  • Core IT fundamentals and system analysis
  • Advanced programming, system design, and database skills

Work Experience

Technology Analyst
Independence Blue Cross, IBX
Nov 2024 - Oct 2025Full-time

Provide technical support to end-users by troubleshooting hardware, software, and network issues across Windows and MacOS environments in a regulated healthcare enterprise.

Key Responsibilities:

  • Resolve 15-30 Level I & Level II IT service requests and incidents daily via ServiceNow leveraging ITIL best practices to support 1,500+ employees
  • Trained and mentored new hires on IT Support processes, troubleshooting, and customer service best practices
  • Configure and troubleshoot mobile devices, Citrix, VMware, and virtual desktop environments
  • Deliver clear, customer-focused communication to diagnose issues and provide tailored resolutions
  • Continuously develop technical skills to adapt to evolving IT systems
ServiceNowITILWindowsMacOSCitrixVMwareActive DirectoryLinux
IT Support Intern
Harrisburg University of Science and Technology
Jan 2022 - May 2022Internship

Provided technical support across the university, resolving hardware, software, and network issues while managing Active Directory accounts.

Key Achievements:

  • Reduced incident resolution time by 35% through proactive troubleshooting and process improvements
  • Resolved 95% of hardware/software/network issues on first contact
  • Managed Active Directory accounts, improving provisioning efficiency by 25%
Active DirectoryServiceNowWindowsLinux
UAT Software Tester
Randstad Technologies
Mar 2016 - Oct 2016Contract

Created and executed user acceptance test (UAT) scripts for loan and home assistance programs, collaborating with development teams to ensure software quality.

Key Achievements:

  • Created and executed user acceptance test (UAT) scripts for loan and home assistance programs
  • Collaborated with the development team to identify, document, and resolve software defects
  • Utilized Agile methodologies to ensure timely delivery of test results and feedback
  • Gained practical experience in SDLC and STLC processes, improving test case accuracy and quality
UATAgileSDLCSTLCTest Scripts
Volunteer Science Tutor
Ethiopian Community
Sep 2022 - PresentVolunteer

Providing one-on-one tutoring in mathematics and science to students in the Ethiopian community, helping them build academic confidence.

Key Achievements:

  • Helped students improve grades by at least one letter grade on average
  • Created customized lesson plans matching each student's learning style
  • Mentored students in study habits, problem-solving strategies, and time management
TutoringMentoringMathematicsScience

Certifications & Awards

CompTIA Security+ (SY0-701) Certification - Certified

2025

Validates essential cybersecurity skills, including network security, threat and vulnerability management, risk mitigation, and security architecture.

Click to verify credentials on Credly →

AWS Certified Solutions Architect - Associate (SAA-C03)

2026 (Certified)

Validates expertise in designing distributed systems on AWS, including deployment, management, and operations.

High Academic Excellence Award - Summa Cum Laude

2022

Awarded for maintaining a GPA of 3.96 throughout the Bachelor's program, demonstrating exceptional academic achievement.

Team Leadership Award

2022

Recognized for exceptional leadership skills in collaborative projects, demonstrating the ability to guide teams to successful outcomes.

Skills

Cybersecurity

Expertise in network security, threat detection, and security auditing. Threat detection, incident response, security operations.

SplunkMITRE ATT&CKWiresharkNmap

Networking

Network infrastructure, protocols, and architecture design.

TCP/IPVPNDNSDHCPLAN/WAN

Cloud

Major cloud platforms and infrastructure management.

AWSAzureGCPAzure AD

IT Support

Enterprise support, ITSM, and end-user services.

ServiceNowJiraActive DirectoryITIL

Programming

Development, scripting, and automation across multiple languages.

PythonJavaScriptTypeScriptSQLBashReactHTMLCSS

Systems

Operating systems and enterprise virtualization tools.

WindowsLinuxMacOSVMwareCitrix

Enterprise Hardware

Hardware troubleshooting, imaging, and deployment.

DesktopsLaptopsPrintersMobile DevicesPeripherals

Database Management

Database administration, querying, and data modeling.

MySQLPostgreSQLMongoDBSQL ServerData Modeling

Featured Projects

Security Awareness Chatbot

Security Awareness Chatbot

AI-powered chatbot for interactive cybersecurity education and guidance. Helps users understand security best practices through conversational AI.

TypeScriptAICybersecurityNLP
Honeypot Threat Intelligence

Honeypot Threat Intelligence

Real-time honeypot system for detecting and analyzing cyber threats. Monitors attack patterns and generates intelligence reports for proactive defense.

TypeScriptHoneypotThreat DetectionSIEM
Personal Portfolio Website

Personal Portfolio Website

A modern, responsive portfolio website built with Next.js and React, featuring interactive elements, accessibility features, and security-focused development practices.

Next.jsReactTailwind CSS
Social Media Cybersecurity Research

Social Media Cybersecurity Research

Research project analyzing cybercriminal activities across social media platforms with comprehensive security recommendations.

ResearchSocial MediaThreat Analysis
Phishing Attack Simulator

Phishing Attack Simulator

An educational tool that simulates phishing attacks to train users on identifying and avoiding security threats.

ReactNode.jsCybersecurity
Client Portfolio Website

Client Portfolio Website

A stunning, modern portfolio website designed and developed for a client, featuring elegant design, smooth animations, and responsive layouts.

Next.jsReactTailwind CSSClient Work

Testimonials

Read what others have to say about working with me

“As a student in my Wireless Security Management course, Biruk demonstrated exceptional analytical skills and a methodical approach to identifying vulnerabilities and implementing solutions. His understanding of security principles and ability to apply them to real-world scenarios was impressive.”
★★★★★
Mani K.
Wireless Security Management, Harrisburg University of Science and Technology
“I had the pleasure of studying alongside this developer during our time in the Computer and Information Science program. He was always dedicated, insightful, and passionate about technology. His strong work ethic and problem-solving mindset made him stand out among his peers. I’m confident that his skills and determination will continue to bring great success in his professional journey.”
★★★★★
Caleb M.
Business Data Analyst II at Stellar Innovations
“Biruk has been an exceptional addition to our Technology Support team. His technical expertise in troubleshooting complex application issues and supporting our infrastructure has significantly improved our service delivery. His ability to quickly adapt to new technologies and provide clear solutions makes him a valuable asset to our team.”
★★★★★
Kim W.
Technology Support Team, IBX
“Working with Biruk on our Network Technology class project was an incredible learning experience. His deep understanding of networking concepts and ability to explain them clearly helped our team excel. I learned so much from his patient guidance and technical expertise throughout the project.”
★★★★★
John S.
Network Technology Course, Community College of Philadelphia
“As a student in my Wireless Security Management course, Biruk demonstrated exceptional analytical skills and a methodical approach to identifying vulnerabilities and implementing solutions. His understanding of security principles and ability to apply them to real-world scenarios was impressive.”
★★★★★
Mani K.
Wireless Security Management, Harrisburg University of Science and Technology
“I had the pleasure of studying alongside this developer during our time in the Computer and Information Science program. He was always dedicated, insightful, and passionate about technology. His strong work ethic and problem-solving mindset made him stand out among his peers. I’m confident that his skills and determination will continue to bring great success in his professional journey.”
★★★★★
Caleb M.
Business Data Analyst II at Stellar Innovations
“Biruk has been an exceptional addition to our Technology Support team. His technical expertise in troubleshooting complex application issues and supporting our infrastructure has significantly improved our service delivery. His ability to quickly adapt to new technologies and provide clear solutions makes him a valuable asset to our team.”
★★★★★
Kim W.
Technology Support Team, IBX
“Working with Biruk on our Network Technology class project was an incredible learning experience. His deep understanding of networking concepts and ability to explain them clearly helped our team excel. I learned so much from his patient guidance and technical expertise throughout the project.”
★★★★★
John S.
Network Technology Course, Community College of Philadelphia

Add Testimonial

Get In Touch

I'm always interested in hearing about new opportunities and collaborations. Feel free to reach out!

Phone

Available upon request

Location

Philadelphia, PA

Schedule a Meeting
Print Download

Biruk Aregu

Philadelphia, PA | aregubq@gmail.com | Phone upon request | LinkedIn Website
Professional Summary

Results-driven IT Professional with a B.S in Computer and Information Science (Summa Cum Laude), Secret Clearance, and expertise in IT Support, Cloud solutions, system administration, Cybersecurity and Web Development. Skilled at diagnosing and resolving complex hardware, software, and network issues across Windows, MacOS, and Linux environments. Hands-on experience with Splunk, Nmap, Wireshark, as well as ITIL based tools like ServiceNow and directory services such as Active Directory and Azure AD, to improve system reliability, strengthen security, and boost performance.

Technical Skills
  • Operating Systems: Unix, Linux, Windows
  • SIEM & Security Tools: Splunk, DataDog, MITRE ATT&CK Framework, Wireshark, Nmap, Nessus, OSSEC, Endpoint Protection, IDS/IPS, Firewalls
  • Cloud Platforms: Azure, AWS, Google Cloud Platform (GCP)
  • Customer Support: Incident management, Troubleshooting, Ticketing systems (ServiceNow, Zendesk, Jira), Remote Desktop Support, User Training
  • Networking: TCP/IP, VPN, DNS, DHCP, LAN/WAN, Switches, Routers, NLA
  • Cybersecurity: Incident Response, Threat Hunting, Log File Analysis, Root Cause Analysis, Security Alert Severity Triage
  • Tools: MS Office, Active Directory, Azure Active Directory, ServiceNow, and Jira
  • Database Management: SQL, MySQL, Oracle, MongoDB
  • Programming Languages: Python, JavaScript, HTML, CSS, SQL, Bash/Shell Scripting
  • AI & Machine Learning: Generative AI, LLMs (GPT, Claude, LLaMA), Prompt Engineering, AI Automation & Workflows, RAG, LangChain, AI-Powered Applications
IT Certifications

CompTIA Security+ (Certified, 2025)

AWS Certified Solutions Architect Associate — (Certified, 2025)

Professional Experience
Technology AnalystNovember 2024 – October 2025
Independence Blue Cross, IBX | Philadelphia, PA
  • Provide technical support to end-users by troubleshooting hardware, software, and network issues across Windows and MacOS environments ensuring system reliability and peak performance.
  • Trained and mentored new hires on IT Support processes, troubleshooting, and customer service best practices.
  • Resolve 15-30 Level I & Level II IT service requests and incidents daily via ServiceNow leveraging ITIL best practices to support 1,500+ employees in a regulated healthcare enterprise.
  • Configure and troubleshoot mobile devices, Citrix, VMware, and other virtual desktop environments to maintain uninterrupted user access.
  • Deliver clear, customer-focused communication to diagnose issues, provide tailored resolutions, and document procedures for future reference.
  • Continuously develop technical skills to adapt to evolving IT systems and improve overall support efficiency.
IT Support InternJanuary 2022 – May 2022
Harrisburg University of Science and Technology | Philadelphia, PA
  • Reduced incident resolution time by 35% through proactive troubleshooting and process improvements in ServiceNow.
  • Resolved 95% of hardware/software/network issues on first contact across Windows and Linux systems.
  • Managed Active Directory accounts, improving account provisioning efficiency by 25%.
UAT Software TesterMarch 2016 – October 2016
Randstad Technologies | El Segundo, CA
  • Created and executed user acceptance test (UAT) scripts for loan and home assistance programs.
  • Collaborated with the development team to identify, document, and resolve software defects.
  • Utilized Agile methodologies to ensure timely delivery of test results and feedback.
  • Gained practical experience in SDLC and STLC processes, improving test case accuracy and quality.
Volunteer Experience
Volunteer Science TutorSeptember 2022 – Present
Ethiopian Community, Philadelphia, PA
  • Provided one-on-one tutoring in mathematics and science, helping students improve grades by at least one letter grade on average.
  • Created customized lesson plans and practice exercises to match each student's learning style and academic goals.
  • Mentored students in study habits, problem-solving strategies, and time management to build long-term academic confidence.

Projects
Cybersecurity Researcher
Harrisburg University of Science and Technology | Philadelphia, PA | September 2021 – December 2021
  • Analyzed data from 100+ users to identify vulnerabilities in social media use, presenting solutions to faculty and students that reduced potential threats.
  • Recommended security best practices including patch management, secure configurations, and privacy controls.
  • Developed and delivered a concise security awareness guide to help users recognize and avoid common cyber threats.
Security Awareness Chatbot
  • Built an AI-powered chatbot using NLP to deliver personalized cybersecurity training, improving phishing recognition rates in pilot testing.
View Project
Phishing Attack Simulator
  • Created a phishing simulation tool with adaptive difficulty to train users on threat detection and response.
View Project
Honeypot Threat Intelligence System
  • Created a distributed honeypot network designed to detect, analyze, and classify real-world cyber threats and provide actionable intelligence.
View Project
Personal Portfolio Website
  • Designed and deployed a responsive portfolio site using Next.js and React to showcase projects and technical skills.
View Website
Education
Bachelor of Science, Computer and Information Sciences — GPA: 3.96
Harrisburg University of Science and Technology, Philadelphia, PA | Aug 2020 – May 2022
Associate in Applied Science, Computer Information Systems — GPA: 3.71
Community College of Philadelphia, Philadelphia, PA | Sep 2018 – Aug 2020

🍯 Honeypot Threat Intelligence

Security Research & Threat Analysis
🎯

Project Goal

Deploy a distributed honeypot network to detect, analyze, and classify real-world cyber threats, providing actionable intelligence on emerging attack patterns and malicious actor behaviors.

Problem

Organizations lack real-time visibility into active threats targeting their infrastructure. Traditional security tools are reactive rather than proactive, missing opportunities to identify new attack vectors and threat actor tactics before they cause damage.

👤

My Role

Security Researcher & Systems Engineer — Designed the honeypot architecture, deployed and configured decoy services, developed threat analysis workflows, created the intelligence dashboard, and produced threat intelligence reports.

🔧

Tech Stack

PythonDockerELK StackT-PotSuricataVirusTotal APIPostgreSQLGrafana

Key Features

  • Multi-service honeypot deployment (SSH, HTTP, SMB, RDP, Telnet)
  • Real-time threat data collection and aggregation
  • Automated malware analysis and classification
  • Geographic threat mapping and IP reputation tracking
  • Attack pattern recognition using machine learning
  • Integration with threat intelligence feeds (MISP, AlienVault OTX)
  • Comprehensive dashboard for threat visualization
  • Automated alert system for critical threat detection
📊

Impact & Results

  • Captured and analyzed over 10,000 unique attack attempts in the first month
  • Identified 15+ new malware variants not previously cataloged
  • Provided early warning of emerging attack campaigns targeting specific industries
  • Generated actionable intelligence reports used by security operations teams
  • Contributed threat indicators to public threat intelligence platforms
  • Improved organizational security posture through proactive threat hunting
  • Reduced incident response time by 40% through early threat detection

🤖 Security Awareness Chatbot

AI-Powered Cybersecurity Education
🎯

Project Goal

Develop an interactive AI-powered chatbot to educate users about cybersecurity best practices and raise security awareness in an engaging, accessible way.

Problem

Traditional security training is often boring, time-consuming, and fails to engage users effectively. Many people lack basic cybersecurity knowledge, making them vulnerable to attacks.

👤

My Role

Full-Stack Developer & AI Integration Specialist — Designed the conversational AI system, developed the knowledge base, implemented the web interface, and deployed the solution.

🔧

Tech Stack

ReactNode.jsOpenAI APIJavaScriptCSSHTML

Key Features

  • Interactive conversational interface for engaging security discussions
  • Comprehensive coverage of cybersecurity topics including phishing, password security, and social engineering
  • Personalized security recommendations based on user responses
  • Security assessment quizzes to test knowledge retention
  • Regular updates to include emerging security threats and best practices
  • User-friendly interface accessible across multiple devices
📊

Impact & Results

  • Provides accessible cybersecurity education to users of all technical backgrounds
  • Helps organizations improve their security awareness training programs
  • Reduces the risk of security incidents through improved user knowledge
  • Creates a more engaging learning experience compared to traditional security training
  • Offers a scalable solution for security education that can reach many users

⚠️ Phishing Attack Simulator

Security Training Platform
🎯

Project Goal

Create an educational cybersecurity tool that simulates phishing attacks to train users on identifying and avoiding threats in a safe, controlled environment.

Problem

Phishing remains one of the most effective attack vectors, yet traditional training methods fail to provide hands-on experience. Users need practical exposure to recognize and respond to phishing attempts.

👤

My Role

Full-Stack Developer & Security Specialist — Designed the simulation platform, created phishing templates, developed the scoring system, implemented analytics, and built the user interface.

🔧

Tech Stack

ReactNode.jsExpressMongoDBChart.jsJWT Authentication

Key Features

  • Realistic phishing email templates with customizable elements
  • Multiple difficulty levels to progressively challenge users
  • Immediate feedback and educational content after each simulation
  • Administrative dashboard for tracking user performance
  • Detailed analytics on common user mistakes and improvement over time
  • Customizable training modules focused on different phishing techniques
  • Scheduling system for periodic training campaigns
📊

Impact & Results

  • Provides hands-on experience with phishing attacks in a safe environment
  • Teaches users to identify common indicators of phishing attempts
  • Builds awareness of social engineering techniques used by attackers
  • Creates measurable improvement in user security awareness
  • Helps organizations reduce vulnerability to phishing-based attacks
🔍

Social Media Cybersecurity Research

Research project analyzing cybercriminal activities across social media platforms with comprehensive security recommendations.

🎯

Project Goal

Conduct a comprehensive qualitative study to understand user awareness and behaviors regarding cybersecurity threats on social media platforms, specifically TikTok and Facebook.

📋

Overview

This research project involved interviewing over 100 active TikTok and Facebook users to assess their understanding of social media security threats, privacy concerns, and protective behaviors. The study aimed to identify knowledge gaps and develop actionable recommendations for improving cyber-awareness among social media users.

Problem

Social media platforms have become primary targets for cybercriminals, yet user awareness of security threats remains critically low. Many users unknowingly engage in risky behaviors that expose them to phishing, identity theft, account takeovers, and other cyber attacks.

👤

My Role

Lead Researcher & Cybersecurity Analyst — Designed the research methodology, conducted user interviews, analyzed qualitative data, identified security awareness patterns, and developed comprehensive recommendations for users and platform providers.

🔬

Research Methods

  • Semi-structured interviews with 100+ TikTok and Facebook users
  • Qualitative data analysis using thematic coding
  • User behavior observation and pattern identification
  • Threat landscape analysis across social media platforms
  • Literature review of existing social media security research
  • Cross-platform security comparison studies
📚

Key Topics Studied

  • Phishing and social engineering attacks on social media
  • Privacy settings awareness and configuration
  • Account security practices (passwords, 2FA, recovery options)
  • Recognition of fake accounts and impersonation attempts
  • Malicious link identification and safe browsing habits
  • Data sharing behaviors and privacy implications
  • Awareness of platform-specific security features
  • Response to suspicious messages and friend requests
🛠️

Tools Used

NVivo Microsoft Excel Google Forms Qualtrics Zoom OSINT Tools Statistical Analysis Software
🔍

Key Findings

78%of users were unaware of basic phishing indicators on social media platforms
23%of participants used two-factor authentication on their social media accounts
65%of users accepted friend requests from unknown profiles without verification
89%of participants had never reviewed or adjusted their privacy settings after initial setup
42%of users clicked on suspicious links from friends' accounts without questioning authenticity
71%were unaware that their public posts could be used for social engineering attacks
15%could correctly identify all signs of a compromised account
📊

Impact & Results

  • Identified critical gaps in social media security awareness among everyday users
  • Developed evidence-based recommendations adopted by university IT security programs
  • Created user-friendly security guidelines distributed to 500+ social media users
  • Informed the development of targeted security awareness campaigns
  • Contributed to academic understanding of social media threat perceptions
  • Provided actionable insights for improving platform security education
  • Highlighted the need for better default security settings on social platforms
✉️

PhishGuard Trainer

Email 1 of 10: Account Phishing
1/10
🛡️

Security Awareness Chatbot

AI-Powered Cybersecurity Assistant
Suggested Questions (Click to ask):

Honeypot Threat Intelligence

Live Simulated Threat Feed
Total Threats
0
High Severity
0
Countries
0
LIVE THREAT FEED
This is a simulated demo. Actual threat data is stored securely and analyzed for security research.
biruk@portfolio:~
visitor@biruk:~$