Skip to content
View mrtnzjhonatan's full-sized avatar

Block or report mrtnzjhonatan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mrtnzjhonatan/README.md

TryHackMe Badge

Hi, I'm Jhonatan Martinez πŸ‘‹

Cybersecurity | Network Security | Cloud Security

Building hands-on labs in AWS, Cisco networking, and malware traffic analysis


Certifications

Professional Certifications

Featured Projects

AWS Secure VPC Infrastructure

Designed and deployed a segmented AWS network architecture using a VPC, public and private subnets, NAT Gateway, Internet Gateway, route tables, and Network ACL security controls.

Technologies AWS VPC β€’ EC2 β€’ NAT Gateway β€’ Internet Gateway β€’ Route Tables β€’ Network ACLs

AWS VPC Architecture

πŸ”— Project Repository
https://github.com/mrtnzjhonatan/aws-vpc-secure-infrastructure


Router-on-a-Stick VLAN Network Lab

Router on a Stick Lab

Designed and implemented a Router-on-a-Stick network topology to enable inter-VLAN communication between segmented networks.
This lab demonstrates how Cisco networking can be practiced using Linux-based tools such as Dynamips, Dynagen, and VPCS without requiring physical hardware.

Key concepts demonstrated:

  • VLAN segmentation
  • Inter-VLAN routing
  • 802.1Q trunk configuration
  • Router subinterfaces
  • Layer 2 and Layer 3 connectivity troubleshooting
  • Cisco router and switch configuration in a Linux environment

πŸ”— Project Repository
https://github.com/mrtnzjhonatan/Router-on-a-Stick-VLAN-Network


Network Traffic Analysis – Malware Investigation

Network Traffic Analysis

Performed network traffic analysis on a compromised host using Wireshark to identify suspicious communications and potential Indicators of Compromise (IoCs).

The investigation focused on analyzing encrypted HTTPS traffic, inspecting TLS handshake metadata, reviewing DNS query behavior, and identifying command-and-control communication over the MQTT protocol.

Key findings included suspicious traffic associated with the Wikiloader malware family, including connections to potentially malicious domains and repeated DNS queries indicating persistent external communication.

Skills Demonstrated

  • Network Traffic Analysis
  • Wireshark Packet Inspection
  • Threat Hunting
  • DNS and TLS Analysis
  • Identifying Indicators of Compromise (IoCs)

πŸ”— Project Repository
https://github.com/mrtnzjhonatan/network-traffic-analysis


πŸ… Computer Information Systems - AA

Associate of Science


πŸ›‘οΈ Cybersecurity Professional with hands-on experience in offensive and defensive security techniques. Ranked in the Top 1% on TryHackMe with over 215+ rooms completed and 29+ badges earned. I specialize in:

  • πŸ” Threat Detection & Blue Teaming
  • 🧠 Vulnerability Assessment & Exploitation
  • 🐧 Linux Privilege Escalation
  • πŸ› οΈ Network & Web Application Pentesting


πŸ”— Skilling Academies

CISA

CDIR

FCDSA

🧠 Skills & Tools

Category Tools / Skills
πŸ” Offensive Security Nmap, Burp Suite, Metasploit, Hydra, SQLMap
πŸ›‘οΈ Blue Teaming Wireshark, OSQuery, Splunk, Sysmon, Yara
πŸ“‘ Networking TCP/IP, DNS, Routing, VLANs
πŸ’» OS Knowledge Linux (Debian, Ubuntu, Kali), Windows AD
βš™οΈ Scripting Bash, Python (basic automation), PowerShell

πŸ§ͺ Featured TryHackMe Rooms

🧩 View all rooms: TryHackMe Profile


πŸ“ Portfolio Projects

πŸ› οΈ Cybersecurity Labs Repo
πŸ“ Write-ups, tools, and hands-on walkthroughs from TryHackMe rooms


πŸ“« Let's Connect


πŸ” Hack The Box Academy Progress

I am actively advancing my cybersecurity knowledge through Hack The Box Academy. Below is a list of completed modules and badges demonstrating hands-on skills in networking, Linux, enumeration, and exploitation.

βœ… Completed Modules

  • 🧠 Learning Process
  • πŸš€ Intro to Academy
  • 🐧 Linux Fundamentals
  • 🌐 Network Enumeration with Nmap
  • πŸ›‘οΈ Introduction to Networking
  • πŸ’£ Using the Metasploit Framework
  • 🐍 Introduction to Python 3
  • πŸ”§ Network Foundations

πŸ… Earned Badges

Badge Description
Badge Solid Basis - Network Foundations
Badge Binary Duo Explorer - two years of learning at HTB Academy
Badge PThe eye that sees all - Network Enumeration with Nmap
Badge Our favorite seabird - Linux Fundamentals
Badge Everything is connected - Introduction to Networking
Badge Snake Charmer - Introduction to Python 3

Pinned Loading

  1. aws-vpc-secure-infrastructure aws-vpc-secure-infrastructure Public

    Designed and deployed a secure AWS VPC infrastructure with public and private subnets, NAT Gateway, Internet Gateway, route tables, and Network ACLs to control inbound and outbound traffic.

  2. Network-Traffic-Analysis Network-Traffic-Analysis Public

    This project documents a network traffic analysis lab focused on identifying unusual behavior and potential Indicators of Compromise (IoCs). I examined packet captures from a compromised system to …

  3. Router-on-a-Stick-VLAN-Network Router-on-a-Stick-VLAN-Network Public

    Router on a Stick configuration