
Christopher Jones
About Me
I am a Cybersecurity professional and Computer Science student at SNHU, driven by a “learn-by-doing” philosophy. My journey began in IT Support, but my focus has evolved into the specialized world of Offensive Security and Penetration Testing.
What sets me apart is my commitment to technical depth. While many are just beginning their journey, I have spent years building and maintaining an enterprise-grade home laboratory. This isn’t just a playground; it is a high-performance environment where I tackle real-world troubleshooting, network failures, and infrastructure challenges daily. Managing a diverse ecosystem—from dual-booting Kali Linux for AD attacks and GPU cracking to configuring VLANs and dedicated hardware targets—has given me the kind of hands-on experience that classrooms alone cannot provide.
I thrive in the terminal and on the edge of the physical-digital divide. Whether I am analyzing RF signals with my LILYGO CC1101, experimenting with Sub-1GHz vulnerabilities via Flipper Zero, or capturing WPA2/3 handshakes, I am constantly pushing the limits of my lab to master the attacker’s mindset.
I believe in “breaking to build.” As the founder of TechTactix, I am already translating these lab-proven skills into practical security audits and network protection. I am a relentless troubleshooter and a lifelong learner, dedicated to securing the future of our connected world through technical rigor and a defensive-offensive lens.
Cybersecurity Skills
My current focus is the intersection of Offensive Security and Network Infrastructure. I am actively building a portfolio of skills that bridges the gap between identifying vulnerabilities and implementing hardened defenses.
Specialized RF & Hardware: Hands-on experience with Sub-1GHz signal analysis, Bluetooth (BLE) sniffing, and HID attack vectors using the Flipper Zero, LILYGO CC1101, and BLEShark Nano.
Penetration Testing: Proficient in the execution of the PTES lifecycle, including reconnaissance, automated scanning (Nmap, RustScan), and web application exploitation (SQLi, XSS) using Burp Suite and Caido.
Network Security: Deep understanding of the OSI model, TCP/IP protocols, and VLAN segmentation. Experienced in capturing and analyzing traffic via Wireshark and auditing wireless security (WPA2/3) using monitor mode and packet injection.
Defensive Foundations: Certified in Google IT Support & Networking, with a strong background in system administration, troubleshooting, and identity access management.

Google Helpdesk & IT Support
Earning the Google IT Support Professional Certificate gave me a strong foundation in the core skills that keep modern systems running securely and efficiently. I gained hands‑on experience with troubleshooting, operating systems, networking fundamentals, system administration, and security best practices, all through real‑world labs and scenarios. The program strengthened my ability to diagnose issues, manage users and devices, work confidently in Linux and Windows environments, and apply structured problem‑solving techniques used by IT professionals every day. This certification became a launching point for my transition into cybersecurity, reinforcing both my technical skills and my commitment to continuous learning.
Penetration Testing Certifications
My certifications from TryHackMe and HackSmarter reflect the hands‑on, challenge‑driven side of my cybersecurity training. Through guided labs, real‑world attack simulations, and progressively harder scenarios, I built practical skills in enumeration, exploitation, privilege escalation, web application security, and Linux/Windows post‑exploitation techniques. These platforms pushed me to think like an attacker while staying grounded in defensive best practices, helping me develop a methodical approach to problem‑solving and threat analysis. Completing these certifications strengthened my confidence in navigating unfamiliar systems, identifying vulnerabilities, and applying ethical hacking techniques that translate directly into real‑world security work.
Planned Certifications
Certified Ethical Hacker (CEH)
Credentialed by EC-Council, this certification validates my abilities to identify and address security vulnerabilities ethically.
CompTIA Security+ Certified
This globally recognized certification confirms my foundational skills in cybersecurity principles and risk management.
Offensive Security Certified Professional (OSCP)
Acknowledged for rigorous hands-on penetration testing expertise, this certification underscores my practical skills operin securing networks.

