> initializing session...

Christopher Ignas

Penetration Tester & Security Professional

I break into networks so the bad guys can't. Specializing in internal & external penetration testing, vulnerability assessments, and adversarial simulation — helping organizations identify and remediate security weaknesses before they become breaches.

Who I Am

I'm a Penetration Tester at Abacode Cybersecurity and Compliance, where I perform internal and external network penetration tests, vulnerability scans, and cybersecurity assessments. My work is rooted in industry-standard methodologies including OWASP, NIST, and the MITRE ATT&CK framework.

Before moving to offensive security, I spent nearly two years as a SOC Analyst — monitoring alerts across SIEM/XDR/EDR platforms, responding to live incidents, and performing root cause analysis. That defensive experience gives me a unique perspective: I understand both sides of the fight.

I hold a B.S. in Business Administration (IT Management) and am currently pursuing a Master's in Cybersecurity and Information Assurance. When I'm not testing networks, I'm building security labs and sharpening my tradecraft.

Current Role

Penetration Tester @ Abacode

Education

B.S. IT Management — WGU

In Progress

M.S. Cybersecurity & IA — WGU

Focus Areas

Pen Testing • Vuln Assessment • Red Team Ops

Where I've Operated

May 2025 — Present

Penetration Tester

Abacode Cybersecurity and Compliance

  • Perform internal & external network penetration tests and cybersecurity assessments
  • Leverage OWASP Penetration Testing Methodology and NIST Technical Guide to Information Security Testing
  • Map misconfiguration findings to NIST 800-53 controls and utilize OWASP Top 10, SANS 25, and MITRE ATT&CK
  • Develop and present detailed technical reports to clients, including executive-level findings
  • Assist in scoping engagements and negotiating rules of engagement for cybersecurity testing projects

July 2023 — May 2025

SOC Analyst

Abacode Cybersecurity and Compliance

  • Monitored client networks using SIEM/XDR/EDR platforms (Splunk, Sentinel, CrowdStrike, SentinelOne, and more)
  • Identified, analyzed, and responded to security incidents in a 24x7 Security Operations Center
  • Crafted escalations with root cause analysis and remediation recommendations for clients

March 2023 — July 2023

IT Support Engineer

TD Synnex

  • Provided run support for SAP, Windows, Linux, and AIX servers across on-premise and cloud environments
  • Maintained and improved operational processes for enterprise infrastructure

January 2023 — March 2023

Help Desk Analyst

Global Data Consultants

  • Handled troubleshooting and support for 15,000+ end-users on the ServiceNow platform
  • Monitored system functionality and resolved technical issues

Tools & Technologies

Offensive Security

Nmap Burp Suite Metasploit ffuf CrackMapExec Nessus Wireshark
🛡

Defensive / SIEM

Splunk Microsoft Sentinel CrowdStrike SentinelOne AlienVault LogRhythm

Cloud & Infrastructure

Microsoft Azure AWS Active Directory Virtual Machines Firewalls NSGs
>_

Languages & Scripting

Python PowerShell Linux / Bash SQL KQL
📜

Frameworks & Standards

OWASP Top 10 NIST 800-53 NIST 800-37 PCI DSS MITRE ATT&CK SANS 25
🔒

Core Competencies

Penetration Testing Vulnerability Mgmt Incident Response Technical Reporting TCP/IP

Credentials

🔐

PNPT

Practical Network Penetration Tester • TCM Security

🛡

CompTIA Security+

CompTIA

🔍

Cybersecurity Analyst

LeveldCareers

🖥

PHDP

Practical Help Desk Professional • CourseCareers

Lab Work

📁 github ↗

SOC & Honeynet in Azure

Built a honeynet in Azure and integrated Microsoft Sentinel (SIEM) with Log Analytics to capture and analyze live attack traffic.

Azure VMs Sentinel Log Analytics PowerShell
📁 github ↗

Active Directory in Azure

Deployed and configured Active Directory Domain Services in an Azure environment with automated user provisioning via PowerShell.

Azure VMs Active Directory PowerShell
📁 github ↗

Azure Networking & Protocols

Explored network security concepts in Azure including NSG configuration, traffic analysis with Wireshark, and protocol behavior.

Azure VMs NSGs Wireshark
📁 github ↗

Help Desk Ticketing System

Deployed osTicket on Azure VMs with IIS, configured from scratch to simulate enterprise help desk operations.

Azure VMs osTicket IIS

Let's Connect

send_message.sh

socials@christopherignas ~ %

$ cat ./connect.txt


// GitHub

github.com/chrisignas


// LinkedIn

linkedin.com/in/christopherignas


// Domain

christopherignas.com



$ echo $STATUS

Open to opportunities and collaborations._