[ download_resume.pdf ]
mathew@dfw:~ — portfolio.sh
[+] connection established
[+] mounting /experience /projects /skills
[+] system ready
 █████╗ ██████╗ ██╗ ██████╗ ██╗      █████╗
██╔══██╗██╔══██╗██║██╔═══██╗██║     ██╔══██╗
███████║██████╔╝██║██║   ██║██║     ███████║
██╔══██║██╔══██╗██║██║   ██║██║     ██╔══██║
██║  ██║██████╔╝██║╚██████╔╝███████╗██║  ██║
╚═╝  ╚═╝╚═════╝ ╚═╝ ╚═════╝ ╚══════╝╚═╝  ╚═╝

mathew o. abiola  ·  it systems & cybersecurity analyst  ·  dallas, tx

guest@portfolio:~$whoami
IT professional with 5+ years spanning enterprise endpoint management,
network infrastructure, and cybersecurity operations.
CompTIA Security+ (SY0-701) certified. Currently pursuing VMware VCP-DCV.
Building tooling and running a home lab to stay sharp.

guest@portfolio:~$cat status.txt
target: cybersecurity analyst · systems administrator · infrastructure engineer
location: dallas, tx · open to relocate
status: open to new opportunities

guest@portfolio:~$ls -la projects/
total 3
[OK] cybersec-homelab/ A self-managed detection and response lab running Wazuh, Suricata, and Wireshark on virtualized infrastructure
[WIP] trenchwatch/ A Solana token monitoring bot that classifies new token launches as runner, slow cook, rug, or dead using on-chain signals and behavioral heuristics
[OK] this-site/ A static portfolio built with Astro, served by nginx on the same VPS that runs TrenchWatch

guest@portfolio:~$ 

cat about.md

I'm an IT professional with 5+ years spanning enterprise endpoint management, network infrastructure, and cybersecurity operations. My background runs from desktop support and device management at ExxonMobil and BART all the way through federal infrastructure and security analysis supporting the DOE Special Technologies Laboratory. I'm CompTIA Security+ certified (SY0-701) and currently working toward VMware VCP-DCV.

Where I differentiate: I don't just keep the lights on — I monitor and harden the environment. I run a home lab with Wazuh, Suricata, and Kali Linux for active detection engineering, and I build tooling (TrenchWatch, this site) to stay sharp outside of the day job. I'm based in Dallas, TX, targeting cybersecurity analyst, systems administrator, and IT infrastructure roles, and I'm open to relocation.

git log --graph --all

* commit 2815c5d   (HEAD -> bart-coordinator)
| Author: mathew o. abiola
|
|     Computer Support Coordinator (contract) · BART · Oakland, CA
* commit 743bde1
| Author: mathew o. abiola
|
|     Infrastructure Analyst II / Cyber Security Analyst II · Mission Support and Test Services (MSTS) · Santa Barbara, CA
* commit 784d2b3
| Author: mathew o. abiola
|
|     Computer Support Administrator · BART · Oakland, CA
* commit 636ff57
| Author: mathew o. abiola
|
|     Computer Support Analyst · BART · Oakland, CA
* commit 5234506
| Author: mathew o. abiola
|
|     Network and Cyber Security Intern (internship) · BART · Oakland, CA
* commit 57ab7f6
| Author: mathew o. abiola
|
|     Desktop and Network Support Engineer · ExxonMobil · Castro Valley, CA

ls -la projects/

[OK] cybersec-homelab/ used to simulate attacks, tune detection rules, and study incident response workflows. [open ›]
[WIP] trenchwatch/ running live on this VPS in shadow mode. [open ›]
[OK] this-site/ built and deployed natively on the box with no CI/CD pipeline. [open ›]

nmap -A skills.local

PORT     STATE  SERVICE               VERSION
22/tcp open   security-monitoring tenable nessus, wazuh, suricata, wireshark, nist 800-61, vulnerability management, incident response
445/tcp open   endpoint-systems windows, macos, linux, jamf, intune, sccm, bigfix
80/tcp open   network tcp/ip, vlans, cisco ios, palo alto, firewall ops, vpn
443/tcp open   virtualization-cloud vmware vsphere, esxi, hyper-v, azure fundamentals
389/tcp open   identity onelogin, okta, active directory, mfa
8080/tcp open   ticketing-itsm servicenow, bmc remedyforce
8443/tcp open   scripting powershell, bash, python (basic)

cat certs.txt

[✓] CompTIA Security+ // SY0-701 · CompTIA · earned 2026-04-24
[~] VMware VCP-DCV // Broadcom
[✓] B.S. Computer Science // San Francisco State University

curl localhost/status.json

# this site is hosted on the box below
hostname
uptime
load avg
commit
updated
fetching...

cat contact.txt

location dallas, tx  // open to relocate
[ download_resume.pdf ]
type help to see available commands
guest@portfolio:~$