Skip to content
View Dariusz-Piasecki's full-sized avatar

Block or report Dariusz-Piasecki

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Dariusz-Piasecki/README.md

Dariusz Piasecki

Junior Cybersecurity Specialist | Munich, Germany

"Security is not a product, but a process." — Bruce Schneier


About Me

I'm a cybersecurity professional with nearly two decades of problem-solving experience from visual media, now fully dedicated to protecting digital assets. Currently completing the Masterschool Cybersecurity Program and certified in CompTIA Security+ and Google Cybersecurity.

  • Passionate about: Blue Team Operations, Incident Response, Security Analysis
  • Focus areas: SQL Forensics, NIST CSF Implementation, MITRE ATT&CK Framework
  • Currently learning: Advanced threat detection, SIEM tools (Splunk, Wireshark), Python for security automation
  • Background: 20+ years in project management and meticulous visual documentation (photography, video, multimedia) — skills I now apply to security operations and technical reporting

Certifications

Certification Issuer Date / Hours Credential
SOC Analysis Masterschool Apr 2025 (1440 h) View Certificate
CompTIA Security+ CompTIA Apr 2025 View Credential
Google Cybersecurity Google Dec 2024 View Credential
Google IT Support Google Nov 2024 View Credential

Complementary Skills & Certs

Certification Issuer Date Credential
CERTIFICATE UX Design InfoShare Academy Apr 2023 View Certificate

Technical Skills

Security & Monitoring

Wireshark Splunk Snort Nmap

Frameworks & Standards

  • MITRE ATT&CK – Threat modeling and adversary tactics
  • NIST CSF – Cybersecurity Framework implementation
  • ISO 27001 – Information security compliance

Operating Systems & Platforms

Linux Windows macOS

Databases & Scripting

SQL Python Bash

Networking & Protocols

TCP/IP • SSH • VPN • DNS • DHCP • SSL/TLS • Kerberos • SNMP • LDAP


Featured Projects

🔗

Investigated security incidents by filtering SQL queries to detect after-hours failed logins, geographic anomalies, and suspicious activity.

  • Tools: SQLite, DB Browser
  • Skills: Data filtering, pattern recognition, threat detection

🔗

Managed file and directory permissions using chmod to enforce least-privilege access control in a research team environment.

  • Tools: Linux, Bash, chmod
  • Skills: Access control, security hardening, least privilege

🔗

Conducted a comprehensive internal security audit using the NIST CSF to assess risk, evaluate controls, and ensure PCI DSS/GDPR/SOC compliance.

  • Framework: NIST CSF
  • Skills: Risk assessment, compliance, security controls

🔗

Documented a ransomware incident response at a healthcare clinic using the 5 W's framework, covering detection, containment, recovery, and post-incident audit.

  • Framework: NIST Incident Response Lifecycle
  • Skills: Incident response, documentation, threat analysis

🔗

Conducted a NIST SP 800-30 vulnerability assessment of a publicly accessible PostgreSQL database, identifying critical risks and delivering prioritized remediation strategies to reduce exposure by 75%.

  • Framework: NIST SP 800-30 Rev. 1
  • Skills: Risk assessment, threat modeling, remediation planning

GitHub Stats

Dariusz's GitHub stats

Top Languages


Education

Masterschool – Cybersecurity Training Program (Sep 2024 - Apr 2025)

  • Incident response, risk assessments, security audits
  • Network troubleshooting, Windows/Linux system security
  • Python scripting, ethical hacking techniques

Publishing School, Cracow – Multimedia Graphic Designer (2011-2012)

  • Web design (HTML), video editing, UI/UX design principles

Professional Background

20+ years in visual media and project management, including:

  • Accredited photographer at Munich Security Conference (2017)
  • Long-term collaboration with Polish Consulate General in Munich
  • International fieldwork in high-risk environments (Iraq, 2013-2023)
  • Management of 20,000+ file repositories with 25% efficiency improvement

This background provides me with:

  • Meticulous attention to detail
  • Strong documentation and reporting skills
  • Complex problem-solving under pressure
  • Cross-functional team collaboration

Connect With Me

LinkedIn Email Website


Currently Exploring

  • Advanced SIEM analytics with Splunk and Wireshark
  • Threat hunting using MITRE ATT&CK
  • Security automation with Python
  • Incident response playbooks and runbooks

Fun Facts

  • Photo of the Year 2015 – Current Archaeology Awards, London
  • Former accredited photographer at international diplomatic events
  • Worked in active conflict zones (Iraq) requiring rapid risk assessment
  • Native Polish speaker | Professional English | German (A2)

"Never confuse education with intelligence" — Richard Feynman


Thanks for visiting my profile! Feel free to explore my repositories and reach out if you'd like to collaborate on cybersecurity projects.

Pinned Loading

  1. sql-security-audit sql-security-audit Public

    Investigating security incidents and filtering organizational logs using SQL.

    1

  2. Linux-File-Permissions Linux-File-Permissions Public

    Managed Linux file and directory permissions using chmod to enforce least-privilege access control and harden a research team's file system.

    1

  3. Botium-Toys-Security-Audit Botium-Toys-Security-Audit Public

    This project features a comprehensive NIST CSF-based security audit for Botium Toys. It focuses on assessing system resilience, identifying critical vulnerabilities, and verifying compliance with P…

    1

  4. Incident-Handler-s-Journal Incident-Handler-s-Journal Public

    Documented a ransomware incident response at a healthcare clinic using the 5 W's framework, covering detection, containment, recovery, and post-incident audit.

    1

  5. Vulnerability-Assessment-Report Vulnerability-Assessment-Report Public

    Conducted a NIST SP 800-30 vulnerability assessment of a publicly accessible PostgreSQL database, identifying critical risks and delivering prioritized remediation strategies to reduce exposure by …

    1