// cybersecurity professional

Jensy
Maldonado

Cybersecurity professional passionate about protecting systems, detecting threats, and building a safer digital world. One red flag at a time.

Threat Analysis Access Management Compliance Risk Management Anti-Fraud
Jensy Maldonado

// 01. about

Who I Am

I'm Jensy Maldonado, a cybersecurity professional based in New York with a focus on identity and access management, risk analysis, and security compliance.

With hands-on experience in both the financial sector and enterprise networking, I'm passionate about defending organizations against evolving threats and building security-first cultures.

I hold the ISC2 CC certification, am finishing up CompTIA Security+, and stay actively involved in the STEM community through leadership and advocacy. Bilingual in English and Spanish.

// Quick Facts

New York, NYBased in
CybersecurityFocus Area
ISC2 CC · Security+ (In Progress)Certifications
Open to OpportunitiesStatus
English · SpanishLanguages

// 02. experience

Where I've Worked

Information Security Intern Mar 2026 – Present
UniCredit · New York City
  • Supporting the implementation of the UniCredit New York Foreign Branch (NYFB) security program to safeguard personnel, information, and both tangible and intangible assets
  • Ensuring proper access management for local applications and systems, including password management support
  • Acting as local point of contact for Security, providing day-to-day consultation, support, and addressing security-related issues
  • Supporting the CISO in managing security incidents and collaborating with local IT service providers to implement necessary measures
  • Providing direct information security training to all employees, contractors, and third parties
  • Managing physical security and access controls, including regular reviews of access logs and assessments of controls to safeguard premises and personnel
  • Developing, maintaining, and regularly testing NYFB's BCDR plans to ensure operational resilience and preparedness for disruptions
  • Conducting Business Impact Analyses (BIA) to identify critical processes, dependencies, and potential impacts of disruptions
  • Supporting the CISO with implementation and monitoring of anti-fraud controls to prevent, detect, and respond to fraudulent activities
  • Participating in security risk assessments and working with stakeholders to implement appropriate mitigation strategies
IAMBCDRBIAAnti-FraudSecurity AwarenessRisk AssessmentPhysical Security
IT Security Intern May 2024 – Dec 2025
Pace University · Pleasantville, NY
  • Configured and maintained Cisco network infrastructure for over 14,000 students and 1,200 faculty/staff, including switches, firewalls, and wireless controllers
  • Assisted with network migrations, upgrades, and expansions, deploying access points, switches, routers, and firewalls across multiple campuses with minimal downtime
  • Assisted in deployment and management of Cisco Secure Firewall Management Center 4600 and Firepower 9000 Series Threat Defense systems
  • Utilized Splunk as a SIEM to monitor network logs, analyze security events, and support incident triage across multi-campus environments
CiscoSplunkSIEMFirewallsWirelessNetwork Security

// 04. education

Academic Background

M.S. CybersecuritySep 2023 – May 2025
Pace University · Seidenberg School of Computer Science & Information Systems

Graduate studies focused on cybersecurity principles, threat analysis, risk management, and information security strategy.

Threat AnalysisRisk ManagementInfoSec
B.E. Computer EngineeringAug 2020 – May 2023
The City College of New York

Undergraduate engineering degree with a focus on computer systems, hardware, and software fundamentals.

Computer SystemsEngineering

// community & leadership

Beyond the Classroom

🛡️

Chapter Lead

Latinas in Cyber (LAIC) · Present
  • Leading the local LAIC chapter, connecting Latinas in the cybersecurity field through community events and mentorship
  • Organized and participated in multiple LAIC events including panels, workshops, and networking sessions
  • Supporting members with career development resources and professional growth opportunities in cybersecurity
Chapter LeadershipMentorshipWomen in CyberCommunity
🌎

President

LAESA-SHPE · Jun 2021 – Present
  • Leading a student and professional organization at the intersection of Latin American engineering and science communities
  • Fostering academic growth, career development, and STEM advocacy for underrepresented students
  • Actively organizing SHPE chapter events, conferences, and community outreach initiatives
LeadershipSTEM AdvocacyCommunity BuildingDiversity in Tech

// 05. certifications

Credentials

🛡️
Certified in Cybersecurity
ISC2 · CC
✓ Active
🔐
CompTIA Security+
CompTIA · SY0-701
Scheduled
🌐
CCNA Cybersecurity
Cisco · 200-201 CCNACBR
Coming Soon

// 07. skills

Technical Skills

Programming & Scripting
PythonPowerShellLinux
Security Tools
WiresharkKali LinuxBurp SuiteNmapMetasploitSecurity OnionCyberArkMagnet Axiom
Platforms & Frameworks
SplunkMicrosoft AzureDockerJiraMITRE ATT&CKNIST

// 06. projects

Notable Projects

Honeypot Deployment & Threat Analysis
  • Deployed containerized honeypots using Docker to simulate vulnerable SSH and HTTP services, capturing over 50 intrusion attempts in isolated virtual networks
  • Automated threat detection scripts in Python, forwarding real-time alerts to Splunk dashboards and mapping attacker behaviors to the MITRE ATT&CK framework
  • Visualized attack patterns with Matplotlib, analyzing 50+ unique IPs and 200+ credential attempts across 3 detailed graphs highlighting top attack vectors and threat geolocation
DockerPythonSplunkMITRE ATT&CKMatplotlib
Splunk Security Monitoring & Threat Detection Lab
  • Installed and configured Splunk Enterprise, onboarding Windows, Linux, and AWS CloudTrail logs while managing indexes, access controls, and forwarders
  • Built SPL queries and real-time dashboards to detect brute-force attempts, port scans, and anomalous authentication behavior mapped to MITRE ATT&CK techniques
  • Investigated alerts by analyzing log patterns, correlating events, and documenting findings using incident-response reporting methods
SplunkSPLAWS CloudTrailMITRE ATT&CKIncident Response

Let's Connect

Interested in collaborating or have an opportunity to discuss? Send a message below.

psst... click me 👀
🎣
🎣

You just got phished.

You clicked something suspicious without knowing what it was. That's exactly how real phishing attacks work. Curiosity does the trick.

🛡️ Pro tip: Always verify before you click. If it looks too curious to ignore, that's the point.