Skip to content
View MgnCoding2020's full-sized avatar

Block or report MgnCoding2020

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
MgnCoding2020/README.md


πŸ” Cybersecurity Governance & Compliance Portfolio

This portfolio demonstrates the design and implementation of structured cybersecurity governance workflows, with a focus on:

  • DISA STIG baseline assessment
  • NIST RMF-aligned security processes
  • identity and access governance
  • continuous monitoring concepts
  • control-to-evidence mapping

The goal of this work is to simulate how a small organization or DoD-aligned environment can implement defensible, repeatable, and audit-ready security practices.


πŸ‘€ About Me

I began my Bachelor of Science in Cybersecurity and Information Assurance in 2024 with an initial focus on offensive security.

As I progressed through CompTIA A+, Network+, and Security+, my interests shifted toward governance, security architecture, and the structured protection of systems.

I started by hardening my own environmentβ€”implementing least-privilege account separation, removing unnecessary services, and applying deny-by-default firewall principles. From there, I began developing baseline comparison workflows to detect configuration drift through scheduled assessments.

This work evolved into building portfolio-driven governance projects that connect security controls, monitoring, and documentation. My focus is on creating structured, repeatable approaches to security that align with frameworks such as NIST RMF and DISA STIG baselines.

I am currently developing hands-on experience with system and network analysis tools such as Nmap, Wireshark, and Sysmon, strengthening my ability to support governance decisions with technical insight.

🎯 Career Focus: Entry-level roles in GRC, RMF, or DoD-aligned cybersecurity environments, supporting compliance assessments, baseline validation, and continuous monitoring efforts.


🧭 Portfolio Focus

This portfolio represents components of a structured security program, emphasizing:

  • baseline configuration management
  • compliance assessment workflows
  • governance documentation
  • remediation tracking
  • continuous monitoring support

Each project is designed to reflect real-world security processes, not just isolated labs.


⭐ Featured Projects

πŸ“Œ STIG & NIST 800-171 Compliance Lab (Primary Project)

A compliance-focused lab exploring how system baselines and security controls align with:

  • DISA STIG concepts
  • NIST SP 800-171 requirements
  • structured compliance workflows
  • documentation and evidence organization

πŸ”— Repository: https://github.com/MgnCoding2020/stig-800-171-compliance-lab


πŸ“Œ GRC Security Program (Coffee Shop Scenario)

A long-form governance project simulating how a security program can be designed for a small business environment.

Focus areas:

  • risk identification and analysis
  • asset inventory development
  • control framework alignment
  • governance documentation

πŸ”— Repository: https://github.com/MgnCoding2020/grc-paper-project-coffee-shop


πŸ“Œ IAM Access Review Lab

A governance-focused lab simulating an identity and access review process.

Focus areas:

  • access inventory validation
  • review workflows
  • findings documentation
  • remediation tracking

πŸ”— Repository: https://github.com/MgnCoding2020/IAM-Access-Review-Lab


🚧 Current Development

Actively building a Windows STIG baseline assessment lab using:

  • SCC (SCAP Compliance Checker)
  • STIG Viewer
  • DISA SCAP benchmark content

This project is focused on creating a repeatable, audit-ready compliance workflow, including:

  • automated baseline scanning
  • checklist validation
  • structured reporting
  • evidence organization

🧠 Core Skill Direction

  • Governance, Risk, and Compliance (GRC)
  • RMF-aligned assessment workflows
  • baseline configuration analysis
  • continuous monitoring concepts
  • control-to-evidence mapping
  • documentation and reporting discipline

🎯 Career Objective

Seeking opportunities in:

  • GRC / Compliance Analysis
  • RMF / DoD-aligned environments
  • security baseline assessment and validation roles

Focused on supporting organizations in building structured, defensible, and continuously monitored security programs.


πŸ“Œ Notes

  • All projects are built for educational and portfolio purposes
  • Sensitive information has been sanitized where applicable
  • Emphasis is placed on realistic workflows, documentation, and repeatability

πŸ“œ Certifications

ISC2 Candidate CompTIA Secure Infrastructure Specialist – CSIS Stackable Certification CompTIA Security+ ce Certification CompTIA IT Operations Specialist – CIOS Stackable Certification CompTIA Network+ ce Certification CompTIA A+ ce Certification


Education

Bachelor of Science β€” Cybersecurity and Information Assurance (WGU)
2024 – In Progress

Pinned Loading

  1. stig-800-171-compliance-lab stig-800-171-compliance-lab Public

    STIG-based compliance lab implementing NIST SP 800-171 and CMMC-aligned security controls with PowerShell automation, validation, and audit-ready evidence

    HTML

  2. grc-paper-project-coffee-shop grc-paper-project-coffee-shop Public

    Building out structured Draft documentation to demonstrate GRC / NISt SP controls. Drafts will be utilized in smaller repo projects

    Python

  3. MgnCoding2020 MgnCoding2020 Public

    Display Credly Badges

  4. IAM-Access-Review-Lab IAM-Access-Review-Lab Public

    Demonstrates an Identity & Access Management (IAM) governance workflow including access review procedures, evidence collection, findings, remediation tracking, and password policy hardening using a…

  5. HomeEDR-and-Governance-Security HomeEDR-and-Governance-Security Public

    Scripts used with task scheduler to generate baselines for your system and develop snapshots to detect if drift occurs

    PowerShell

  6. Cybersecurity-Monitoring-Lab Cybersecurity-Monitoring-Lab Public

    A defensive cybersecurity lab demonstrating Windows event monitoring and investigation with Sysmon. The project documents real telemetry such as process execution, PowerShell activity, and DNS look…