Hi, I'm
Tyler Droxler

I'm a cybersecurity student at Western Governors University, working toward a B.S. in Cybersecurity and Information Assurance. I've always been passionate about understanding how computer systems work and keeping them secure. This portfolio highlights my hands-on labs  and technical projects that show my commitment to learning, problem-solving, and building practical skills. As I grow in the field, I continue to explore new topics and strengthen my ability to think critically, investigate threats, and design secure systems.

A collection of hands-on labs where I explore aspects of cybersecurity such as threat hunting, analysis, vulnerability remediation, and compliance.

Nov 1, 2025

Threat Hunting Investigation

In this project, I simulate a scenario where management suspects a subject is using TOR browser to bypass company security controls. Acting as a threat hunter, I use Microsoft Defender for Endpoint and KQL to trace file activity, process execution, and network connections—validating whether the suspected user launched TOR and connected to known relay nodes.

Tools Used
Microsoft Azure & EDR, KQL
See On Github
Sep 21, 2025

Phishing Analyzer - Email Scanner

A Python tool that scans .eml email files for signs of phishing. It checks the sender, message text, links, and attachments for red flags like suspicious keywords, fake domains, and risky file types. The tool gives each email a score, a clear verdict, and can optionally check link reputations with VirusTotal.

Tools Used
Python, Virus Total
See On Github
Aug 20, 2025

Vulnerability Scanning & Remediation

Scanned my Azure cloud environment with Nessus to uncover security vulnerabilities across virtual machines and services. Focused on identifying and prioritizing high‑severity risks based on potential impact. Applied targeted fixes and confirmed improvements through follow‑up scans, resulting in a stronger overall security posture.

Tools Used
Microsoft Azure, Nessus
View Project
See On Github
Coming Soon...

AI SOC Analyst - Using
Python and Open AI API

In this project I develop a Python workflow that connects Open AI’s API with my Azure cloud environment to aggregate and centralize security logs. I leverage AI to scan, triage, and investigate potential vulnerabilities, streamlining the analysis process. This approach reduced manual workload and accelerated incident detection, showcasing the power of automation in SOC operations.

Tools Used
Microsoft Azure, OpenAI API
View Project
See On Github
Coming Soon...

Honey Pot - Catching Bad Actors

In this project, I built a honeypot in Azure to attract and monitor malicious activity in a controlled cloud environment. A honeypot is used to simulate vulnerable systems, luring attackers so their behavior can be observed and analyzed without risking real assets. My setup captures brute-force login attempts and other suspicious actions, which I investigate by querying logs with KQL. I also visualize attacker locations on a custom map, helping me identify patterns and analyze their tactics, techniques, and procedures.

Tools Used
Microsoft Azure & MDE
View Project
See On Github

Experience

Prodigy Pest Solutions
Pest Control Technician
Philadelphia, PA
Aug 2020 - Present
Prodigy Pest Solutions
Philadelphia, PA
Pest Control Technician
Aug 2020 - Present
Conduct thorough inspections of residential and commercial properties to identify pest infestations and assess safety risks
Administer EPA-approved treatments and evaluate outcomes to ensure consistent, effective pest management
Provide exceptional customer service by educating clients on pest prevention, recommending treatment plans, and upselling service packages to drive revenue growth
Service and calibrate pest control equipment, and mentor new technicians on safety protocols and operational best practices
TD Bank, NA
Bank Teller
Holmes, PA
Apr 2019 - Aug 2020
Prodigy Pest Solutions
Philadelphia, PA
Pest Control Technician
Aug 2020 - Present
Process daily customer transactions—including deposits, withdrawals, transfers, and loan payments with accuracy and full compliance to TD Bank’s operational standards
Deliver professional customer service by resolving account inquiries, guiding clients through digital banking tools, and fostering trust
Identify opportunities to meet client financial needs by recommending and referring TD Bank products and services, helping achieve branch sales targets
Reconcile and balance cash drawer each shift, maintaining strict compliance with internal controls and regulatory requirements

Education

Salt Lake City, UT
Bachelor of Science - BS, Cybersecurity and Information Assurance (Expected: Fall 2026)
Western Governors University
Completed competency-based coursework covering network security, cryptography, digital forensics, incident response, vulnerability assessment, cloud security, Python scripting, SQL optimization, Linux administration, SIEM tools, and NIST/ISO security frameworks.
Middletown, PA
Computer Engineering Studies
Pennsylvania State University
Completed Computer Engineering coursework at Penn State Brandywine, covering digital logic design, circuit analysis, microprocessor fundamentals, Java and C programming.

Certifications

CompTIA A+ (In Progress)
Computer hardware, operating systems, networking, and troubleshooting
View
CompTIA Data+ (In Progress)
Data mining, analytics, visualization, governance
View
CompTIA Network+ (In Progress)
Network architecture, implementation, security, troubleshooting
View
CompTIA Security+ (In Progress)
Risk management, threat mitigation, compliance
View
CompTIA Project+ (In Progress)
Planning, executing, monitoring IT projects
View
CompTIA Network Vulnerability Assessment Professional+ (In Progress)
Scanning, analyzing, remediating network vulnerabilities
View
CompTIA Network Security Professional (In Progress)
Designing and securing network infrastructures
View
CompTIA Security Analytics Professional (In Progress)
Security data analysis and incident response
View
CompTIA Pentest+ (In Progress)
Scoping, executing, reporting penetration tests
View
CompTIA IT Operations Specialist (In Progress)
Managing daily IT operations and support
View
CompTIA IT Secure Infrastructure Specialist (In Progress)
Securing hardware and software infrastructures
View
Linux Essentials (In Progress)
Open-source principles, command line basics, file/permission management, simple scripting
View
(ISC)² CCSP (In Progress)
Cloud concepts, data security, platform/infrastructure security, application security, operations, legal/compliance
View
(ISC)² SSCP (In Progress)
Security concepts, access controls, risk analysis, incident response, cryptography, network and systems security
View