Alex Enlow
Business-focused technology professional specializing in IT systems and cybersecurity for small businesses. I solve complex problems, secure your infrastructure, and implement solutions that drive measurable growth.
Building systems that scale, securing businesses that grow
As a technology strategist, I enable small businesses to achieve sustainable growth through optimized systems, resilient cybersecurity, and efficient operations. My blended background in IT infrastructure and security allows me to design solutions that reduce risk, improve performance, and scale with organizational needs.
I thrive on multitasking across diverse projects and continuously testing my abilities across the entire technology spectrum. From securing networks to troubleshooting systems to architecting new infrastructure, I love the challenge of learning something new every day. My clients appreciate my business-oriented mindset and clear communication. I don’t just implement solutions, I help you understand why they work and how they drive measurable results.
Certifications
Projects & Tools
Vulnerability Scanner
Automated web vulnerability scanner that detects SQL injection, XSS, and other OWASP Top 10 vulnerabilities. Features detailed reporting, custom payloads, and integration with CI/CD pipelines.
Network Mapper
Advanced network discovery and mapping tool that identifies live hosts, open ports, and running services. Includes stealth scanning capabilities and export to multiple formats.
Phishing Detector
Browser extension that analyzes URLs and email content to detect phishing attempts using machine learning. Real-time protection with pattern recognition and heuristics.
Technical capabilities and specializations
Penetration Testing
Security Tools
Programming
Education & Career Roadmap
From student to security specialist — trace my path through education, experience, and continuous growth
High School Diploma
Chariho Regional High School
Built foundation in mathematics, science, and problem-solving. Early interest in technology sparked through computer courses and self-directed learning.
Bachelor’s Degree in Progress
University of Rhode Island
Pursuing degree in Computer Science with focus on cybersecurity and network systems. Hands-on experience with enterprise security tools, penetration testing methodologies, and secure coding practices.
Google Cybersecurity Certificate
Google / Coursera
Completed comprehensive cybersecurity program covering threat detection, network security, incident response, and security operations. Gained practical experience with industry-standard tools and frameworks.
IT Support & Systems Admin
Various Organizations
Provided technical support, managed infrastructure, implemented security policies, and maintained critical systems. Experience with Active Directory, network troubleshooting, and endpoint security.
CompTIA Security+ (In Progress)
CompTIA
Currently studying for Security+ certification, deepening knowledge in threat analysis, cryptography, identity management, and security architecture. Expected completion early 2025.
Current: IT & Security Specialist
Freelance & Contract Work
Providing comprehensive IT and cybersecurity services for small businesses. Specializing in infrastructure security, vulnerability assessments, incident response, and security awareness training. Building scalable solutions that grow with client needs.
Professional Credentials Hub
Industry-recognized certifications validating expertise in cybersecurity, networking, and cloud technologies
Google Cybersecurity Certificate
Hover to see details
Skills Covered:
- • Threat detection & analysis
- • Network security monitoring
- • Incident response & recovery
- • Python for security automation
CompTIA Security+
CompTIA
Expected: Q1 2025
Currently Studying:
- • Threat analysis & mitigation
- • Cryptography & PKI
- • Identity & access management
- • Security architecture
Certified Ethical Hacker
EC-Council
Hover to see details
Will Cover:
- • Penetration testing methodology
- • Vulnerability assessment
- • Exploit techniques & tools
- • Web application hacking
Offensive Security Certified Professional
Offensive Security
Hover to see details
Will Master:
- • Advanced penetration testing
- • Network exploitation
- • Privilege escalation
- • Custom exploit development
Certified Information Systems Security Professional
(ISC)²
Hover to see details
Domains:
- • Security & risk management
- • Asset security
- • Security architecture
- • Identity & access management
AWS Certified Security – Specialty
Amazon Web Services
Hover to see details
Cloud Security:
- • Incident response in AWS
- • Data protection & encryption
- • Infrastructure security
- • Compliance & governance