Naomi Taake – Cybersecurity Portfolio

Naomi Taake Profile Photo

I am a senior Cybersecurity major at York University and currently serve as the Vice President of FBLA and Theta Psi. I was a member of both the volleyball and track teams, which taught me how to balance the demands of being a student and an athlete while maintaining strong academic performance. Below is a collection of projects from my capstone and upper‑level cybersecurity courses, as well as my resume.

Email: naomianne3@gmail.comLinkedIn: Profile

Projects

Comprehensive Multi‑Domain Security Assessment — Skyline Innovations (2026)

Performed mobile malware analysis (MobSF), phishing simulation, and AWS cloud security audit. Identified spyware‑level APK behavior, credential‑harvesting risks, and critical IAM/S3/CloudTrail misconfigurations. Delivered remediation aligned with NIST and ISO 27001, strengthening identity management, monitoring, and cloud security posture.

Cybersecurity Operations Assessment

Jan 2026 – May 2026 • York University

Conducted a comprehensive security assessment for an enterprise technology startup, evaluating mobile, cloud, and social engineering threat vectors. Performed mobile malware analysis using MobSF to identify spyware on corporate Android devices. Designed phishing simulation campaigns and implemented AWS cloud security hardening, including IAM role optimization, CloudTrail logging, and S3 access controls.

Lab: Securing a Wireless Network from Wardriving Attacks

York University • Cybersecurity Lab

In this lab, I simulated a wardriving reconnaissance scenario to discover and secure vulnerable Wi‑Fi networks. Using tools such as Kismet and LinSSID, I identified wireless access points, analyzed signal strength, and evaluated security configurations to determine exposure to wardriving threats. The lab emphasized detecting insecure networks and applying defensive measures to strengthen wireless security.

View Lab Report

Active Reconnaissance & Network Scanning Lab

Jan 26 – Feb 2, 2026 • York University

Performed active reconnaissance on a simulated enterprise network using Nmap, Zenmap, Wireshark, Nessus, and OpenVAS. Identified hosts, open ports, OS versions, and vulnerabilities such as MS17‑010 and weak MySQL credentials. Captured and analyzed SYN, ACK, TCP Connect, and UDP packet sequences to understand network behavior and attack surfaces.

View Lab Report
View Resume