Manuel Lugo | Cybersecurity Portfolio

white and gray optical illusion

Professional Experience

Help Desk Technician

Well Path – Long Beach, CA

Feb 2022 – Feb 2023

  • Provided Tier I/II technical support in a healthcare enterprise environment, supporting user access, account issues, and workstation troubleshooting across multiple departments.

  • Handled Active Directory administration, including account creation, password resets, and permission adjustments across domain-joined systems.

  • Supported Windows Server (2016–2019) environments and participated in patching, system updates, and basic server monitoring tasks.

  • Assisted with junior system administration tasks including printer server setup, group policy updates, and user provisioning in Azure and Office 365.

  • Participated in basic cybersecurity duties, including account lockout audits, endpoint remediation coordination, and compliance documentation.

  • Worked daily with tools such as Microsoft Endpoint Manager, ticketing systems, and Office 365 Admin Center to maintain user uptime and ensure system integrity.

  • Collaborated with IT leadership to maintain documentation and ensure audit readiness for hardware/software inventory.

Information Technology Specialist (25B)

U.S. Army – Bell Gardens, CA

Jun 2020 – Feb 2024

  • Managed and secured LAN operations for 100+ users, ensuring seamless connectivity and mission continuity across multiple sites.

  • Performed VMware and Hyper-V administration, optimizing virtual environments for system reliability and scalability.

  • Configured and maintained Cisco routers and switches, supporting secure network communication under DoD standards.

  • Held active Secret clearance, ensuring compliance with classified system handling and secure facility access.

  • Delivered end-user support, reducing troubleshooting time and enhancing IT readiness across the unit.

Infantryman (11B)

U.S. Army – Joint Base Lewis-McChord (JBLM), WA

Feb 2017 – Jun 2020

  • Enforced physical and operational security protocols in secure facilities; ensured compliance with national security regulations.

  • Managed critical equipment valued at $100,000+, maintaining 100% accountability and mission readiness.

  • Coordinated logistics and personnel in high-stress environments; enhanced leadership and adaptability under pressure.

  • Maintained Secret clearance and followed secure communications procedures.

Certifications

MacBook Pro near cup on desk
MacBook Pro near cup on desk

Core Technical Skills

CompTIA: ITF+, A+, Network+, Security+

black framed eyeglasses and black pen
black framed eyeglasses and black pen

Languages: Python, Bash, PowerShell

Systems: Windows, Linux (Kali, Ubuntu)

Tools: Wireshark, Nmap, Burp Suite, Splunk, Nessus

Platforms: TryHackMe, Hack The Box

Cloud/Virtualization: VMware, Hyper-V, basic AWS

Certs in Progress: CySA+, CCNA

Raspberry Pi-Hole

This project focused on setting up a Raspberry Pi-Hole to block ads and malicious domains across the entire network, improving security and performance through DNS-level filtering.

Project A.C.E

A customizable open-source SIEM dashboard with widget support, real-time filtering, and modular visualizations for blue team analysis.

A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.

Explore hands-on security projects and how I build them.

Let's connect

A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.

Whether you’re hiring, collaborating, or just geeking out about cybersecurity, I’d love to hear from you.

Reach out for job opportunities, blog topics, lab walkthrough ideas, or to connect with a fellow veteran in tech.